Protecting life is serious business. In order for you to do your job with confidence, we need to ensure that the devices, software and services we supply are reliable and secure. When we build a new hardware or software product, it isn’t just about functionality - we also make it a top priority that your information is tightly guarded. This way, you can trust your tools to keep important information safe and focus on what really matters.
Parametry bezpieczeństwa z podziałem na produkty
Security of The Axon Network
These are features and measures Axon has taken to secure all Axon products and services.
Identyfikacja luk bezpieczeństwa i ich likwidacja
Axon conducts regular vulnerability assessments to improve Evidence.com and Axon security controls and processes. Identification programs for Evidence.com include frequent vulnerability scans and at least quarterly penetration tests performed by highly specialized and vetted 3rd party security firms. All identified vulnerabilities are evaluated by the Axon Information Security team, assigned risk and remediation time frames, and tracked through remediation.
Monitorowanie bezpieczeństwa i reakcja
Axon employs a dedicated Security Operations team to monitor the security of the Axon network, including Evidence.com. The team is highly skilled and capable to immediately respond to threats and malicious actors.
Hackers and other malicious actors move fast, and they take advantages of entities that can’t keep their systems up to date and secure. Evidence.com is delivered as Software as a Service and not only are security patches applied well within vendor recommendations, but Evidence.com also ensures that Axon devices that are part of the Axon network frequently receive security upgrades. These frequent security updates and upgrades come out of the box with the Axon’s Evidence.com service and do not require your interaction. Axon's product and service security upgrades and patches are applied during Evidence.com's Maintenance Schedule.
By having a laser focus on security and aggressively investing to maintain such security, we are able to deploy and appropriately manage advanced security tools and threat prevention solutions that are cost- or resource-prohibitive to individual agencies. Unlike what you would find with an off-the-shelf anti-virus software that you install yourself, we offer advanced protections that deter even the most sophisticated attackers. We have finely tuned web application firewalls, leverage security intelligence tools for continuous monitoring, and deploy layers of defense to detect and react to malicious activity.
Raportowanie zagrożeń lub luk bezpieczeństwa
Każdy, kto wie o problemie dotyczącym bezpieczeństwa powiązanym z kontem w serwisie Evidence.com, podejrzewa istnienie takiego problemu lub uważa, że odkrył lukę w zabezpieczeniach w serwisie Evidence.com lub w produkcie firmy Axon, jest proszony o przesłanie szczegółowego objaśnienia tego problemu lub luki na adres email@example.com. Przed udostępnieniem tych informacji innym prosimy o czas niezbędny do zbadania problemu i jego eliminacji.
W sprawie wszelkich problemów niedotyczących kwestii bezpieczeństwa prosimy o kontakt z Obsługą klienta firmy Axon.