Trust & Security

Security Without Compromise

Enterprise AI requires enterprise-grade security. Axon AI is built on a zero-trust architecture, continuously audited, and designed to meet the most demanding regulatory environments.

Controls

Our Security Controls

A selection of the technical and organisational measures protecting your data.

Data

Encryption at Rest

AES-256 encryption for all stored data.

Network

Encryption in Transit

TLS 1.3 enforced for all API and web traffic.

Access

Zero-Trust Architecture

Every access request is verified regardless of network origin.

Compliance

SOC 2 Type II

Annual audit by an accredited third-party auditor.

Testing

Penetration Testing

Quarterly external penetration tests. Critical findings resolved within 48 hours.

Patching

Vulnerability Management

Automated CVE scanning across all dependencies. Critical patches deployed within 24 hours.

Identity

Single Sign-On (SSO)

SAML 2.0 and OIDC support for enterprise identity providers.

Auth

MFA Enforcement

Multi-factor authentication required for all production access.

Audit

Audit Logging

Immutable logs retained for 12 months with tamper-evident storage.

Availability

DDoS Protection

Global CDN with layer 3/4/7 DDoS mitigation.

Resilience

Business Continuity

RTO of 4 hours, RPO of 1 hour across primary and secondary regions.

Research

Responsible Disclosure

Dedicated [email protected] channel with 5-business-day acknowledgement SLA.

Responsible Disclosure

Report a Vulnerability

If you discover a security vulnerability in our systems, we ask you to disclose it responsibly. We commit to acknowledging all reports within 5 business days and resolving critical issues within 48 hours.

Email [email protected]

Want to review our security documentation?

Request Security Pack