Trust

  • Security

    Building a new hardware or software product isn’t just about functionality - we also make it a top priority that your information is tightly guarded.

    Learn More

  • Compliance

    Understand the controls that have been put in place as well as our commitment to secure your data.

    Learn More

  • Principles

    Axon is built for agencies big or small, and is committed to creating a transparent partnership with all customers.

    Learn More

Your Data's Security Is Our Top Priority

You place your trust in us to keep your information safe, so we'll do whatever it takes to maintain that trust. Our comprehensive program is always watching out for you. This is how:

People

We have a dedicated security team with exceptional experience protecting critical data. They know security, and they have a
budget to wield. For you, that's like having a dedicated team at your agency whose sole existence is to keep your evidence data safe—all day, every day.

In addition to the dedicated security team, all Axon employees understand that our top priority is security. Every employee
completes annual and role-specific security training to ensure every step we take maintains the security of customer data.

And we only hire the best - all employees undergo an extensive background check process and are subject to role-specific
security clearances or adjudication processes, including CJIS background screening and national security clearances and vetting.

Practices

Yes, our products comply with industry standards like the FBI CJIS Security Policy. But they also exceed them. No one is forcing us to do things like protect our facilities with biometric controls, conduct regular vulnerability tests, or keep a cyber insurance policy. We do them because it's how we'll keep your trust.

Our Information Security program is ISO/IEC 27001:2013 Certified and is designed and operated to ensure a comprehensive, continual improvement based management system to protect Evidence.com and customer data within Evidence.com.

Products

When we build a new hardware or software product, we do so with an emphasis on keeping information locked up. That's why Evidence.com is built on a secure infrastructure and has security-focused features like audit trails, customizable permissions, and strict authentication protocols.

All Axon products undergo rigorous security analysis and assessments during development and throughout their lifecycle. We also hire device security experts to identify vulnerabilities in advance of a malicious user using them to their advantage. Axon's hardware and software engineering teams are trained on developing secure products and performing peer code reviews to identify potential vulnerabilities. In short, we do a lot to ensure every product we ship meets our customers' demanding security expectations.

And we know you demand high-quality, reliable products. That’s why Axon's quality management system governing the manufacturing of our products is ISO 9001:2008 Certified.