A world's leading developer of intelligent VMS and PSIM software
Where to buy

Cybersecurity

System integrity check

Prevent unauthorized interference with your VMS

When you start servers and clients, Axxon Next automatically checks the digital signature for all executable files. If all files are in place and match their signatures, a “System integrity check passed successfully” record appears in the system log.

Otherwise, a “System integrity check failed” event is registered, and you can set the system to perform one of the pre-configured actions:

  • Show warning to administrators.
  • Show warning to all users.
  • Block users without admin rights.
  • Stop non-vital services.
System integrity check
System integrity check

Security policy

Protect your VMS from unauthorized access

Axxon Next security policy ensures that no unauthorized persons can access the system. The user security policy includes:

  • Setting a minimum password length.
  • Storing password history.
  • Setting password expiry date.
  • Setting the required password strength.
  • Prevention of multiple simultaneous sessions.
  • Blocking the user and specifying the ban time/number of failed login attempts.

Each user-related event includes the user’s IP address. When accessing the server, the MAC address of the client computer is registered in the system event log. The Export Start event includes the username. You can set a range of permissible IP addresses for the client computers; users can also access the server with administrator confirmation.

Security policy

Cloud cybersecurity features

Secure connection and password storage

AxxonNet cloud service connects to your Axxon Next VMS servers via the HTTPS protocol using TLS encryption. No opening any ports or deploying other potentially vulnerable settings is needed, which ensures that your VMS does not become externally accessible. Transmitted video and other data are encrypted, which makes it impossible for unauthorized persons to access your information.

In AxxonNet, no user passwords are stored unencrypted (as cleartext), but password hashing is applied instead. When you enter your credentials to register in AxxonNet, the password is processed with a hashing algorithm, and only the hash sum is stored. When you enter your password to log in, the algorithm calculates its hash sum and compares it to the stored one to grant you access to the service. It is impossible to reconstruct a password based on the hash sum, so your vital data is inaccessible to attackers.

Cloud cybersecurity features

Secure camera connection

Encrypted video streaming

Axxon Next can receive encrypted video streams from cameras. It supports the RTSPS protocol, and RTSP over HTTPS for ONVIF compliant devices. For transmitted video data, TLS encryption is supported.

Secure camera connection
Technical specifications

A convenient table view of Axxon Next core functions, special features, video analytics, and supported devices and standards.

View specs
Presentation

PDF version of the complete Axxon Next presentation containing detailed information about the product.

Download .pdf
Brochure

Detailed information about Axxon Next features and technologies in a pdf format.

Download .pdf
Try Axxon Next for Free Today

See how the intelligent VMS can meet your requirements. Register with My AxxonSoft and get a free trial.

Try it now
User guide

The user guide contains the information necessary to design, build, and operate a security system based on Axxon Next.

Read the guide