Trust & Security
Security Without Compromise
Enterprise AI requires enterprise-grade security. Axon AI is built on a zero-trust architecture, continuously audited, and designed to meet the most demanding regulatory environments.
Our Security Controls
A selection of the technical and organisational measures protecting your data.
Encryption at Rest
AES-256 encryption for all stored data.
Encryption in Transit
TLS 1.3 enforced for all API and web traffic.
Zero-Trust Architecture
Every access request is verified regardless of network origin.
SOC 2 Type II
Annual audit by an accredited third-party auditor.
Penetration Testing
Quarterly external penetration tests. Critical findings resolved within 48 hours.
Vulnerability Management
Automated CVE scanning across all dependencies. Critical patches deployed within 24 hours.
Single Sign-On (SSO)
SAML 2.0 and OIDC support for enterprise identity providers.
MFA Enforcement
Multi-factor authentication required for all production access.
Audit Logging
Immutable logs retained for 12 months with tamper-evident storage.
DDoS Protection
Global CDN with layer 3/4/7 DDoS mitigation.
Business Continuity
RTO of 4 hours, RPO of 1 hour across primary and secondary regions.
Responsible Disclosure
Dedicated [email protected] channel with 5-business-day acknowledgement SLA.
Report a Vulnerability
If you discover a security vulnerability in our systems, we ask you to disclose it responsibly. We commit to acknowledging all reports within 5 business days and resolving critical issues within 48 hours.
Email [email protected]Want to review our security documentation?
Request Security Pack