How Axis revolutionized surveillance with award-winning radar technology
Despite being more than 100 years old, radar technology has only been used in commercial surveillance for the last 10 years. Having now won 14 design and innovation awards for their work, we spoke with the team at Axis responsible for bringing radar to the masses.
Read more
Exploring the Present and Future of Video Surveillance with IDC’s Mike Jude
Get an insights into the IDC MarketScape: Worldwide Video Surveillance Camera 2023 Vendor Assessment and download an excerpt of the report.
Read more
Edge AI: unlocking the power of edge computing
Find out about the primary opportunities of edge computing for video surveillance when undertaking advanced analytics using artificial intelligence.
Read more
Axis Raises The Bar on Cybersecurity to Provide Wide-Ranging FIPS 140-Compliant Products to Government Customers
4
minutes read
Axis products with AXIS OS 11 now support IEEE 802.1AE MACsec, significantly enhancing security in zero-trust networks
4
minutes read
![Axis products with AXIS OS 11 achieve ETSI EN 303 645 cybersecurity certification Axis products with AXIS OS 11 achieve ETSI EN 303 645 cybersecurity certification](/sites/default/files/styles/card_xs_x1/public/marketing_pics/2024-01/etsi_axis_os.jpg.webp?itok=fijRrIUU)
Maintaining trust in video surveillance through signed video
5
minutes read
![Stefan Lundberg and Sebastian Hultqvist talking Stefan Lundberg and Sebastian Hultqvist talking](/sites/default/files/styles/card_xs_x1/public/migrated/2022-05/stefan_lundberg_talking_to_sebastian_hultqvist_2205_1700w.jpg.webp?itok=cE34D_Pq)
Cybersecurity is (still) a shared responsibility
6
minutes read
![Lock my people](/sites/default/files/styles/card_xs_x1/public/marketing_pics/2024-07/padlock_cybersecurity_people_aerial_white_background_2600x1462_2104.png.webp?itok=epQbbuhv)
![Cybersecurity Securing better cyber protection together](/sites/default/files/styles/card_xs_x1/public/marketing_pics/2023-10/cybersec_axis_office_2208_940x784.jpg.webp?itok=jTTT4Hv4)
![Lifecycle management](/sites/default/files/styles/card_xs_x1/public/marketing_pics/2024-06/cybersecurity_hands_padlocks_virtual_keyboard_2600x1462_2003.png.webp?itok=J6y8l48O)
![Cybersecurity cybersecurity](/sites/default/files/styles/card_xs_x1/public/migrated/2022-12/cybersecurity_world_1700w.jpg.webp?itok=1AfXLuKZ)
Common cyber threats in a video surveillance system
6
minutes read
![Man holding tablet with security screen](/sites/default/files/styles/card_xs_x1/public/marketing_pics/2024-07/man_holding_tablet_home_security_2600x1462_2006.png.webp?itok=WbPpuIDd)
Achieving maturity in the cybersecurity journey
6
minutes read
![axis cybersecurity history axis cybersecurity history](/sites/default/files/styles/card_xs_x1/public/migrated/2023-04/cybersec_axis_city_2_2208_1700w.jpg.webp?itok=amXW9qmV)