Zero-trust network integrations

As the Information Technology (IT) network becomes more tightly integrated with the Operational Technology (OT) environment, it is important that they work together in a safe and trusted way, meeting IT requirements, but at the same time making the operational security installation a breeze. With the right combination of expertise, capabilities, and tools you will improve the security control. 

Explore practical integration guides and get to know the technologies used by our products to support secure integration into zero-trust networks.

AXIS Camera Station Device Compatibility Tool icon

Simplify network onboarding

Zero-touch secure onboarding of Axis devices onto an IP network
Cyber security icon

Achieve better network security

Open and standardized framework for seamless integrations into daily workflows
Configure your system icon

Decrease operational costs

Automated security provisioning of devices, without the need for IT skilled labor in the field
axis device id visual

Security capabilities

Axis Edge Vault provides the root-of-trust and security capabilities needed for Axis devices to integrate seamlessly into customer networks. HTTPS and IEEE 802.1X standards for port-based network access control are enabled by default, allowing zero-touch onboarding without configuration. With AXIS OS 11.8, devices also support IEEE 802.1AE MACsec for enhanced Ethernet Layer 2 encryption, strengthening security in zero-trust networks. 

Each Axis device is provisioned with a unique Axis device ID (IEEE 802.1AR-compliant IDevID) from the factory, to ensure authentication and trust throughout its lifecycle. Secure protocols such as HTTPS TLS 1.2/1.3, secure syslog, network time security (NTS), IEEE 802.1X, and IEEE 802.1AE MACsec further ensure the device's secure operation.

skyscrapers looking up sky

Monitoring and visibility

Profiling the type of IoT device entering the network and continuously monitoring them, are key elements during the lifecycle. Axis devices adhere to IT industry standard discovery protocols such as Link Layer Discovery Protocol (LLDP), Cisco Discovery Protocol (CDP) and Bonjour/MDNS to share device information in factory default state. For monitoring purposes, a comprehensive audit log is provided for monitoring configuration changes and login attempts that can be sent to a central monitoring system through the IT industry standardized syslog format.

Hands on a laptop writing with symbols overlayed

Cost-efficient automation

The sheer number of IoT devices that can populate a network can be overwhelming when it comes to manageability and following IT compliance rules. That’s why Axis made it as easy as possible to manage these devices. Device onboarding, for instance, can be fully automated in Axis devices through IEEE 802.1X using the IEEE 802.1AR-compliant Axis device ID certificate. AXIS Device Manager can help with HTTPS and IEEE 802.1X certificate management, and devices also support APIs for certificate management.

Resources

Automation

Network integration guide

Secure integration of Axis devices into HPE Aruba Networking powered networks.

AXIS OS Hardening Guide

This guide helps you to better secure your network, devices, and services.

Network security

Certificate management

Encrypted HTTPS and other secure connections to access the devices securely.

Audit logs for compliance

AXIS OS provides detailed logs of events, for audit and access control management purposes.

Network access and device identity

Axis devices support IEEE 802.1X, IEEE 802.1AR and IEEE 802.1AE.

Signed certificates

AXIS Device Manager comes with a built-in CA service to issue signed certificates.

IT compliance

Axis complies with a variety of regulatory requirements, and strategically selected frameworks and standards.

Lifecycle management and monitoring

Proactive monitoring

Quickly view potential vulnerabilities and detect connectivity issues.

Operational status

Quickly know operation status of Axis software.

Cybersecurity Axis office people

Axis Cybersecurity

Learn more about assessing risks and consequences, and taking appropriate steps.