Skip navigation

Our Security Goes Above and Beyond, Just Like You.

You place your trust in us to keep your information safe, so we'll do whatever it takes to maintain that trust. Think of it like this: Your partner would risk his or her life for you in the line of duty, right? Now take that online. As the partner you trust with your data, that's how seriously we at TASER and Axon take security. Our comprehensive program is always watching out for you. This is how:

People

We have a dedicated security team with exceptional experience protecting critical data. They know security, and they have a budget to maintain. For you, that's like having a dedicated team at your agency whose sole existence is to keep your evidence data safe—all day, every day.

In addition to the dedicated security team, all TASER employees understand that our top priority is security. Every employee completes annual and role-specific security training to ensure every step we take maintains the security of customer data.

And we only hire the best - all employees undergo an extensive background check process and are subject to role-specific security clearances or adjudication processes, including CJIS background screening and national security clearances and vetting.

Practices

Our products comply with industry standards. And they also exceed them. No one is forcing us to do things like protect our facilities with biometric controls, conduct regular vulnerability tests, or keep a cyber insurance policy. We do them because it's how we'll keep your trust.

Our Information Security programme is ISO/IEC 27001:2013 Certified and is designed and operated to ensure a comprehensive, continual improvement based management system to protect Evidence.com and customer data within Evidence.com.

Products

When we build a new hardware or software product, we do so with an emphasis on keeping information locked up. That's why Evidence.com is built on a secure infrastructure and has security-focused features like audit trails, customisable permissions, and strict authentication protocols.

All Axon products undergo rigorous security analysis and assessments during development and throughout their lifecycle. We also hire device security experts to identify vulnerabilities in advance of a malicious user using them to their advantage. Axon and TASER's hardware and software engineering teams are trained on developing secure products and performing peer code reviews to identify potential vulnerabilities. In short, we do a lot to ensure every product we ship meets our customers' demanding security expectations.

And we know you demand high-quality, reliable products. That’s why TASER's quality management system governing the manufacturing of our products is ISO 9001:2008 Certified.

We’re Transparent

Axon is built for our customers. We are clear about what we do, what we provide and how we provide it.

We explain things clearly in our contracts

Our contracts are written so our customers can understand them. We detail out critical elements including data ownership, our commitments to security, and how we store and manage your data to your instruction.

We use industry standard formats

We have all experienced when you can’t open or play back a file because it’s in a format that locks you into a specific vendor product. It’s super annoying. We don’t do that. Axon products use non-proprietary, industry-leading video formats—no expensive software or time-intensive conversions required. We also allow for bulk export of your evidence data out of Evidence.com in case you want to try another system. We will win and retain your business by providing great products and an awesome user experience, not by restricting your ability to leave.

Our pricing is clear and consistent

We enable all customers to avoid bill shock by providing a live system usage dashboard, offering unlimited data plans and making available numerous financing options. No one likes when there are unexpected charges on your phone or cable bill. Axon lets you avoid that.

You rely on Evidence.com - we make sure it’s available

We challenge ourselves to meet customers' Evidence.com availability expectations, and that’s why we have implemented Service Level Standards to hold ourselves accountable if we don't meet those levels.

We’re open to questions

Have questions about Axon security and trust practices? Need to perform an audit to ensure our security? We are here to help and are open to appropriately scoped customer audits.

We challenge and test ourselves

We are confident that we build secure and trustworthy products, but we don't stop there: we make ourselves prove it on a continuous basis. To ensure our processes meet our rigorous internal requirements, we impose ourselves to 3rd party assessments including ISO/IEC 27001:2013, ISO 9001:2008 and at least quarterly penetration tests of Evidence.com.

We communicate your responsibilities

In any cloud computing service, some operational and security elements remain the responsibility of the users. We clearly outline and assist you in understanding and achieving those responsibilities. We are secure, and want you to be secure as well. Learn more here.

It’s a Partnership

When procuring products and services, the relationship with a provider doesn’t end after the delivery of goods. You as a customer are effectively entering an ongoing relationship and are bound by the quality, support and product evolution of the provider. So it’s critical you select someone that aligns with your needs.

We hire talented people that focus on our customers

Here at Axon, we focus on hiring and developing the best to talent manage our product development and provide customer support. We keep a constant, open ear to customer demands and desires to steer the development of our products.

We integrate with your other systems

Evidence.com integrates with your directory services to enable Single Sign-On, with your CAD and RMS system to automate data entry, and more with our robust application programme interface (API). It’s painful when systems work in silos and can’t communicate with each other, so we've built solutions to avoid that pain.

We train and guide your users

Axon and TASER offer extensive onsite training, training material and interactive courses to ensure your users are using Evidence.com effectively and securely. Check out our additional resources. We not only give you the vehicle, but we teach you to drive it.

We Focus on Public Safety

Axon and TASER focus on developing and managing the best products for the public safety market. We don’t create products for other markets and repurpose them to serve public safety. Our products are built from the ground up to meet the specific needs of public safety customers.

We let you know where we are going

How do you ensure that when you create this partnership that it will last for years? Well, you need to know what your partners’ plans are and what lies ahead in the future. Axon can provide customers and prospective customers our Product and Technology Roadmap that details upcoming products and features. Contact your Axon Sales Representative for more details.

We've got your back

We understand that human error can occur when managing your Evidence.com users and credentials. That’s why TASER maintains a cyber insurance policy and is able to issue an insurance certificate to customers naming them as additional insured under our cyber insurance policy.

Our Track Record

We have been providing products to the public safety market since 1993. TASER is a financially sound, publicly traded company with a strong history of innovation. Read more about TASER and Axon.

Evidence.com has been operating for over 5 years and is deployed in over seven regions around the globe. We have met the needs of some of the most revered police forces in the world but also are dedicated to providing the same level of service and dedication to the smallest of our public safety customers.

Our products are used by over 17,000 law enforcement agencies in over 100 countries around the world. Our mission to protect life and protect truth endures.

We're sorry, the requested video could not be found.
Powered By OneLink