Trust

Your Data's Security Is Our Top Priority

You place your trust in us to keep your information safe, so we'll do whatever it takes to maintain that trust. Think of it like this: Your partner would risk his or her life for you in the line of duty, right? Now take that online. As the partner you trust with your data, that's how seriously we at Axon take security. Our comprehensive program is always watching out for you. This is how:

People

We have a dedicated security team with exceptional experience protecting critical data. They know security, and they have a budget to wield. For you, that's like having a dedicated team at your agency whose sole existence is to keep your evidence data safe—all day, every day.

In addition to the dedicated security team, all Axon employees understand that our top priority is security. Every employee completes annual and role-specific security training to ensure every step we take maintains the security of customer data.

And we only hire the best - all employees undergo an extensive background check process and are subject to role-specific security clearances or adjudication processes, including CJIS background screening and national security clearances and vetting.

Practice

Yes, our products comply with industry standards like the FBI CJIS Security Policy. But they also exceed them. No one is forcing us to do things like protect our facilities with biometric controls, conduct regular vulnerability tests, or keep a cyber insurance policy. We do them because it's how we'll keep your trust.

Our Information Security program is ISO/IEC 27001:2013 Certified and is designed and operated to ensure a comprehensive, continual improvement based management system to protect Evidence.com and customer data within Evidence.com.

Products

When we build a new hardware or software product, we do so with an emphasis on keeping information locked up. That's why Evidence.com is built on a secure infrastructure and has security-focused features like audit trails, customizable permissions, and strict authentication protocols.

All Axon products undergo rigorous security analysis and assessments during development and throughout their lifecycle. We also hire device security experts to identify vulnerabilities in advance of a malicious user using them to their advantage. Axon's hardware and software engineering teams are trained on developing secure products and performing peer code reviews to identify potential vulnerabilities. In short, we do a lot to ensure every product we ship meets our customers' demanding security expectations.

And we know you demand high-quality, reliable products. That’s why Axon's quality management system governing the manufacturing of our products is ISO 9001:2015 Certified.