SYSTEM DESIGN FOR SUCCESS WITH AXIS TOOLS

HJ “Durnukly Hyzmat”  offers a wide portfolio of IP-based products and solutions for security and video surveillance of AXIS company.

  • Project type

    Monitoring,

  • Location

    Ashgabat, Turkmenistan

img

Innovating for a smarter, safer world

Our security cameras, video encoders, accessories and access control products are based on open industry standards. The products integrate easily with Axis’ video management software, or with a partner product, to build a complete security or surveillance solution.

By combining intelligent technology and human imagination, we offer solutions based on sight, sound and analytics to improve security and optimize business performance

Explore our customer stories to see how our solutions help across a wide range of industries and services, fulfilling needs and ensuring success every day.

The consequence of a security breach can include loss of confidentiality, as well as compromised data integrity and availability. Any organization with IP-networked devices, including surveillance cameras, must address the vulnerabilities that internet connection presents. Cybersecurity is, therefore, top of mind at Axis. As cybersecurity requires continuous vigilance and maintenance, the responsibility of maintaining security falls not only on manufacturers, but also on partners and customers who must do their part as well to maximize protection.

 

In this article, we explain the Axis approach to cybersecurity, and why a shared and ongoing responsibility between all stakeholders is vital to maintaining it.

Cybersecurity built in: how Axis minimizes security risks

“Cybersecurity is a fundamental and natural part of the Axis DNA,” says Jonas Falk, Director Cybersecurity, Software Development at Axis. “It’s an integral part of everything we do, from new technology development, to our own day-to-day operations. At Axis, security considerations are addressed right from the start of a new product’s development process, and this focus continues throughout the product’s lifecycle.”

To make sure this happens, a dedicated Axis cybersecurity team, the Axis Software Security Group, has defined the Axis Security Development Model (ASDM) that guides development teams to minimize the risk of vulnerabilities in Axis products during design and implementation. The group guides the methodology and activities, including tests involving simulated cyberattacks, that help to improve the security of Axis products.

Most Axis networked devices are driven by AXIS OS, the Axis operating system. While AXIS OS drives the features of Axis products, it’s also designed to reduce the risk of vulnerabilities and improve security of products from deployment through to decommissioning. New AXIS OS versions for devices are made available on a continual basis, and they include the latest security patches and bug fixes.

“A significant step Axis took was transforming the development of software for devices from an individual approach for each product, to a software platform that today is the foundation for most Axis products,” says Andre Bastert, Global Product Manager AXIS OS Cybersecurity at Axis. “Focusing on a common platform based on AXIS OS means we can more readily ensure development and updates to enhance security in an efficient and timely fashion.”

A key aspect of Axis’ strength in cybersecurity also comes from the strong foundation provided through the hardware-based security platform called Axis Edge Vault. Edge Vault safeguards the integrity of Axis devices and enables the execution of operations requiring cryptographic keys. Edge Vault enhances supply chain protection and provides secure key storage. Cybersecurity, however, cannot be achieved by developing new security features alone. A security foundation – with an overarching strategy comprising processes and policies that are implemented and improved over time – is necessary.

Having transparency in cybersecurity

“It’s important for customers to mitigate supply chain risks from networked products that are integrated into their systems, and at Axis, we believe that customers deserve to have transparency from their suppliers to help them mitigate risks,” says Andre. “It’s why we place such importance in being transparent, in areas such as the management of software vulnerabilities, in order to be a responsible partner in helping to protect our customers.”

Axis is approved as a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA) for its products. The CVE Program provides the framework and tooling that enable organizations around the world to manage and disclose newly identified vulnerabilities. Joining the CVE Program testifies to the commitment of an organization to following ethical vulnerability management best practices with a focus on customers.

 

Similar Projects