As the Information Technology (IT) network becomes more tightly integrated with the Operational Technology (OT) environment, it is important that they work together in a safe and trusted way, meeting IT requirements, but at the same time making the operational security installation a breeze. With the right combination of expertise, capabilities, and tools you will improve the security control.
Explore practical integration guides and get to know the technologies used by our products to support secure integration into zero-trust networks.
Axis Edge Vault provides the root-of-trust and security capabilities needed for Axis devices to integrate seamlessly into customer networks. HTTPS and IEEE 802.1X standards for port-based network access control are enabled by default, allowing zero-touch onboarding without configuration. With AXIS OS 11.8, devices also support IEEE 802.1AE MACsec for enhanced Ethernet Layer 2 encryption, strengthening security in zero-trust networks.
Each Axis device is provisioned with a unique Axis device ID (IEEE 802.1AR-compliant IDevID) from the factory, to ensure authentication and trust throughout its lifecycle. Secure protocols such as HTTPS TLS 1.2/1.3, secure syslog, network time security (NTS), IEEE 802.1X, and IEEE 802.1AE MACsec further ensure the device's secure operation.
Profiling the type of IoT device entering the network and continuously monitoring them, are key elements during the lifecycle. Axis devices adhere to IT industry standard discovery protocols such as Link Layer Discovery Protocol (LLDP), Cisco Discovery Protocol (CDP) and Bonjour/MDNS to share device information in factory default state. For monitoring purposes, a comprehensive audit log is provided for monitoring configuration changes and login attempts that can be sent to a central monitoring system through the IT industry standardized syslog format.
The sheer number of IoT devices that can populate a network can be overwhelming when it comes to manageability and following IT compliance rules. That’s why Axis made it as easy as possible to manage these devices. Device onboarding, for instance, can be fully automated in Axis devices through IEEE 802.1X using the IEEE 802.1AR-compliant Axis device ID certificate. AXIS Device Manager can help with HTTPS and IEEE 802.1X certificate management, and devices also support APIs for certificate management.
Secure integration of Axis devices into HPE Aruba Networking powered networks.
This guide helps you to better secure your network, devices, and services.
Encrypted HTTPS and other secure connections to access the devices securely.
AXIS OS provides detailed logs of events, for audit and access control management purposes.
Axis devices support IEEE 802.1X, IEEE 802.1AR and IEEE 802.1AE.
AXIS Device Manager comes with a built-in CA service to issue signed certificates.
Axis complies with a variety of regulatory requirements, and strategically selected frameworks and standards.
Quickly view potential vulnerabilities and detect connectivity issues.
Quickly know operation status of Axis software.
Axis Cybersecurity
Learn more about assessing risks and consequences, and taking appropriate steps.