Skip to main content

Our approach to earning your trust

From ideation to implementation and operation, the three trust principles of availability, confidentiality and integrity are embedded into Avigilon’s products and services to help you protect your business.


Ensuring the system is functioning as intended and is protected from backdoor access and malware.


Ensuring the systems are available when needed and that data is protected from deletion, whether intentional or accidental.


Ensuring the right people have access to the right parts of the system and that access is protected by password and encryption.

Built on a foundation of security

We’ve worked hard to build a multi-layered, advanced system to meet the requirements of security-conscious organizations.

  • Physical security

    Our solutions leverage multi-factor and/​or biometric authentication, one-time passwords, employee location awareness and instant credential revocation to enhance physical security.

  • Virtual security

    Our cloud software is continuously upgraded and updated to protect against emerging threats, while minimizing system downtime.

From design to implementation, our solutions are developed with security at the forefront.

Proactively protecting your data

  • Enhanced authentication

    Avigilon solutions use measures such as multi-factor authentication and complex password requirements to help keep your data safe.

  • Data privacy and protection

    We leverage strong and modern cryptographic protocols and enforce the encryption of data in transit and at rest to help protect your private information.

  • Restricted access

    For enhanced security, we adhere to the principle of least privilege to reduce the attack surface of our systems.

Maintaining enhanced cybersecurity

To maintain a high level of security, we engage in continuous improvement practices to stay ahead of evolving cybersecurity threats.

  • Vulnerability management

    We scan for vulnerabilities 24/7 to proactively address any potential vulnerabilities according to our internal SLAs.

  • External audits

    We engage in regular third-party penetration testing as well as external security and compliance auditing (SOC 2) to help ensure the security of our system.

A proactive approach to security

Learn more about the steps we take to ensure security is at the core of all our products, processes and services.

  • Transparency and training

    We work with our channel and technology partners to provide them the information, tools and training that they need to install and maintain our solutions securely.

  • Testing and auditing

    Our cloud services undergo rigorous penetration tests and third-party auditing to adhere to the Systems and Organization Controls (SOC) framework to continuously improve our services.

  • Motorola Solutions Technology Advisory Committee (MTAC)

    MTAC helps ensure our innovations remain aligned with our ethics and and consider the broader implications to our partners, customers and the communities we serve.

Compliance and certifications

Avigilon solutions are rigorously tested to comply with the required standards provided by local, state, federal and international regulatory bodies.

NDAA Compliant

The National Defense Authorization Act (NDAA) restricts the use, procurement, or sale of certain brands of surveillance equipment for federal agencies.

SAFETY Act Designation

The SAFETY Act provides important legal liability protections for providers of Qualified Anti-Terrorism Technologies, whether they are products or services.

GDPR Compliant

The General Data Protection Regulation (GDPR) requires businesses to safeguard personal identifiable information and privacy of EU citizens for transactions that occur within EU member countries.

SOC 2 Type II Certified

The System and Organization Controls (SOC) is a set of security controls created by The American Institute of Certified Public Accountants (AICPA). Our cloud services have achieved SOC 2 Type 1 and Type 2 compliance, ensuring that customer data is protected at all times.

ISO 27001 certified

ISO 27001 certification provides a framework and guidelines for establishing, implementing and managing an information security management system (ISMS) to protect the business and customers data.


The PCI DSS provides a set of security standards for the payment card industry (PCI) to help ensure the security of credit card transactions.


The California Privacy Rights Act (CPRA) is built upon the existing California Consumer Privacy Act (CCPA) that regulates how California residents’ personal information is handled, processed and stored; including deleting of personal information and the “right to forget.”

FIPS 140-2

The Federal Information Processing Standard Publication 140-2 specifies the security requirements that will be satisfied by a cryptographic module.

Have questions? We can help

Our video security experts can help you implement the right security system for your business.