Our approach to earning your trust
From ideation to implementation and operation, the three trust principles of availability, confidentiality and integrity are embedded into Avigilon’s products and services to help you protect your business.
Integrity
Ensuring the system is functioning as intended and is protected from backdoor access and malware.
Availability
Ensuring the systems are available when needed and that data is protected from deletion, whether intentional or accidental.
Confidentiality
Ensuring the right people have access to the right parts of the system and that access is protected by password and encryption.
Built on a foundation of security
We’ve worked hard to build a multi-layered, advanced system to meet the requirements of security-conscious organizations.
-
Physical security
Our solutions leverage multi-factor and/or biometric authentication, one-time passwords, employee location awareness and instant credential revocation to enhance physical security.
-
Virtual security
Our cloud software is continuously upgraded and updated to protect against emerging threats, while minimizing system downtime.
From design to implementation, our solutions are developed with security at the forefront.
Proactively protecting your data
-
Enhanced authentication
Avigilon solutions use measures such as multi-factor authentication and complex password requirements to help keep your data safe.
-
Data privacy and protection
We leverage strong and modern cryptographic protocols and enforce the encryption of data in transit and at rest to help protect your private information.
-
Restricted access
For enhanced security, we adhere to the principle of least privilege to reduce the attack surface of our systems.
Maintaining enhanced cybersecurity
To maintain a high level of security, we engage in continuous improvement practices to stay ahead of evolving cybersecurity threats.
-
Vulnerability management
We scan for vulnerabilities 24/7 to proactively address any potential vulnerabilities according to our internal SLAs.
-
External audits
We engage in regular third-party penetration testing as well as external security and compliance auditing (SOC 2) to help ensure the security of our system.
A proactive approach to security
Learn more about the steps we take to ensure security is at the core of all our products, processes and services.
-
Transparency and training
We work with our channel and technology partners to provide them the information, tools and training that they need to install and maintain our solutions securely.
-
Testing and auditing
Our cloud services undergo rigorous penetration tests and third-party auditing to adhere to the Systems and Organization Controls (SOC) framework to continuously improve our services.
-
Motorola Solutions Technology Advisory Committee (MTAC)
MTAC helps ensure our innovations remain aligned with our ethics and and consider the broader implications to our partners, customers and the communities we serve.
Compliance and certifications
Avigilon solutions are rigorously tested to comply with the required standards provided by local, state, federal and international regulatory bodies.
NDAA Compliant
The National Defense Authorization Act (NDAA) restricts the use, procurement, or sale of certain brands of surveillance equipment for federal agencies.
SAFETY Act Designation
The SAFETY Act provides important legal liability protections for providers of Qualified Anti-Terrorism Technologies, whether they are products or services.
GDPR Compliant
The General Data Protection Regulation (GDPR) requires businesses to safeguard personal identifiable information and privacy of EU citizens for transactions that occur within EU member countries.
SOC 2 Type II Certified
The System and Organization Controls (SOC) is a set of security controls created by The American Institute of Certified Public Accountants (AICPA). Our cloud services have achieved SOC 2 Type 1 and Type 2 compliance, ensuring that customer data is protected at all times.
ISO 27001 certified
ISO 27001 certification provides a framework and guidelines for establishing, implementing and managing an information security management system (ISMS) to protect the business and customers data.
PCI DSS
The PCI DSS provides a set of security standards for the payment card industry (PCI) to help ensure the security of credit card transactions.
CPRA/CCPA
The California Privacy Rights Act (CPRA) is built upon the existing California Consumer Privacy Act (CCPA) that regulates how California residents’ personal information is handled, processed and stored; including deleting of personal information and the “right to forget.”
FIPS 140-2
The Federal Information Processing Standard Publication 140-2 specifies the security requirements that will be satisfied by a cryptographic module.
Have questions? We can help
Our video security experts can help you implement the right security system for your business.