Axis signs CISA Secure by Design pledge

January 2026 News & Events, Surveillance, Information Security

Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

A voluntary pledge focused on enterprise software products and services that complements existing software security best practices, the pledge calls on manufacturers to enshrine security as a core business requirement and to address seven key security aspects. These include multi-factor authentication (MFA), reduced default passwords, reduced classes of vulnerability, security patches, vulnerability disclosure policies, transparency in vulnerability reporting, and sharing evidence of intrusions.

“CISA’s Secure by Design pledge aligns well with our goal of making cybersecurity a core part of what we offer. By making this pledge, we affirm our continuous commitment to helping customers follow cybersecurity best practices and drive greater accountability in the physical security industry,” said Johan Paulsson, chief technology officer at Axis Communications.

Axis addresses the Secure by Design Pledge across its solutions portfolio, which encompasses physical security and network surveillance hardware, OS-based network products, video and device management software, and service offerings such as Axis Cloud Connect.

Axis developers follow the Axis Security Development Model (ASDM) to mitigate security risks during the entire product lifecycle. The security framework uses several tools and processes, and further strengthens product security via external resources, including Axis’s bug bounty programmes and the ability for users to report bugs and vulnerabilities. Additionally, the Axis Trust Centre provides cybersecurity and compliance information for Axis as a company and AXIS OS-based network products.

Axis IP-network devices, including cameras, audio speakers, intercoms, and access control products, use AXIS OS, which is designed with no default passwords and supports MFA when users access the devices using centralised identity and access management (IAM). AXIS OS also enables zero-trust networking by default from the factory for secure device verification and onboarding, allowing products to automatically authenticate via IEEE 802.1X using their IEEE 802.1AR-compliant secure device identities.

Axis’s video management software (VMS), AXIS Camera Station Pro and AXIS Camera Station Edge, ensure secure external communications between devices and Axis network cameras through 256-bit AES encryption using Axis Secure Remote Access v2.

From a device management perspective, Axis offers several dedicated and easy-to-use solutions for managing edge devices. AXIS Device Manager, AXIS Device Manager Edge, and AXIS Device Manager Extend help customers cost-effectively perform device software updates and security hardening across thousands of Axis network devices.

Software-supported functions include automating the lifecycle of TLS certificate provisioning, providing simple device configuration backup and restore capabilities, and managing password changes, HTTPS, IEEE 802.1X, and other services on Axis devices.

Axis Cloud Connect, the company’s open hybrid cloud platform that enables end customers and integration partners to manage Axis devices, supports and protects products by applying new software updates that include security patches. Additionally, the platform establishes connectivity through secure communication channels such as HTTPS and WebRTC with TLS 1.2/1.3, and supports single sign-on (SSO) and multi-factor authentication for My Axis accounts.

“Cybersecurity is not an add-on or standalone product feature divorced from design, development and manufacturing processes. Not only is it a critical component of securing our solutions, but it also holds us as a company accountable, thus strengthening the trust and certainty that customers expect when using our products. Security is also subject to innovation, and with each new advancement or refinement, or even regular security patch, we continue to set the standard in product, network and system resilience in our industry and around the world,” Paulsson added.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
2025 Global OSPAs winners
News & Events
Bringing together the very best of the global security industry, the second Global Outstanding Security Performance Awards (OSPAs) was streamed live to a worldwide audience on 05 February 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.