Axon
Axon
Axon
Axon
Axon
Axon
Evidence.com is a scalable, cloud-based system that consolidates all of your digital files, making t
EVIDENCE.COM SUMMARY
UNIFY YOUR DIGITAL ASSETS
Eliminate data silos and manage all types of digital media from capture to courtroom, all with one secure system.
FASTER WORKFLOWS
Achieve the fastest speed of evidence processing through automation. Save time and money with industry-leading redaction technologies and secure digital sharing tools.
SCALABLE TECHNOLOGY
Enable deployments of any size with active directory integration, groups, reports, CAD/RMS Integration, automatic retention schedules and more.
THE AXON ADVANTAGE
Start immediately with no hardware to set up. Choose between plans with fixed or unlimited storage, and adjust instantly if needed. Stay up to date with free, automatic updates every month.
EVIDENCE.COM FEATURES AND BENEFITS
LOWEST TOTAL COST OF OWNERSHIP:
Evidence.com eliminates the cost of an in-house data center and the time associated with manual processes.
AVAILABILITY:
Hosted securely in the cloud, Evidence.com can be accessed anytime, anywhere.
ONE-CLICK SEARCH:
Search by officer name, incident ID, location and other tags to find files quickly.
CONFIGURABLE RETENTION:
Schedule automatic retention periods based on incident type or crime severity.
CASE MANAGEMENT:
Quickly view and share all digital files related by case number.
REDACTION SUITE:
Save time with automated redaction, bulk redaction, clips, markers, thumbnails and more.
CAD/RMS INTEGRATION:
Automate Axon video tagging by pulling in the correct metadata from existing systems.
PROSECUTOR WORKFLOW:
Connect digitally with the prosecutor using the most scalable sharing solution available.
MOBILE INTEGRATION:
Store and manage files captured with mobile devices in the field.
ANALYTICS AND AUDIT TOOLS:
Monitor system usage, from total videos uploaded to who has reviewed, shared and deleted files.
EVIDENCE.COM SECURITY FEATURES
CJIS-COMPLIANCE
Evidence.com is fully CJIS compliant.
AUDIT TRAIL AND CHAIN OF CUSTODY
Data is tamper-proof and all access events are reported in a secure audit trail.
CUSTOMIZABLE USER PERMISSIONS
Administrators can determine what files can be viewed by users and groups of users.
DATA ENCRYPTION
All information is fully encrypted in transit and at rest.