Passer au contenu principal

Evidence.com is a scalable, cloud-based system that consolidates all of your digital files, making t

EVIDENCE.COM SUMMARY

UNIFY YOUR DIGITAL ASSETS

Eliminate data silos and manage all types of digital media from capture to courtroom, all with one secure system.

FASTER WORKFLOWS

Achieve the fastest speed of evidence processing through automation. Save time and money with industry-leading redaction technologies and secure digital sharing tools.

SCALABLE TECHNOLOGY

Enable deployments of any size with active directory integration, groups, reports, CAD/RMS Integration, automatic retention schedules and more.

THE AXON ADVANTAGE

Start immediately with no hardware to set up. Choose between plans with fixed or unlimited storage, and adjust instantly if needed. Stay up to date with free, automatic updates every month.

 

EVIDENCE.COM FEATURES AND BENEFITS

LOWEST TOTAL COST OF OWNERSHIP:

Evidence.com eliminates the cost of an in-house data center and the time associated with manual processes.

AVAILABILITY:

Hosted securely in the cloud, Evidence.com can be accessed anytime, anywhere.

ONE-CLICK SEARCH:

Search by officer name, incident ID, location and other tags to find files quickly.

CONFIGURABLE RETENTION:

Schedule automatic retention periods based on incident type or crime severity.

CASE MANAGEMENT:

Quickly view and share all digital files related by case number.

REDACTION SUITE:

Save time with automated redaction, bulk redaction, clips, markers, thumbnails and more.

CAD/RMS INTEGRATION:

Automate Axon video tagging by pulling in the correct metadata from existing systems.

PROSECUTOR WORKFLOW:

Connect digitally with the prosecutor using the most scalable sharing solution available.

MOBILE INTEGRATION:

Store and manage files captured with mobile devices in the field.

ANALYTICS AND AUDIT TOOLS:

Monitor system usage, from total videos uploaded to who has reviewed, shared and deleted files.

 

EVIDENCE.COM SECURITY FEATURES

CJIS-COMPLIANCE

Evidence.com is fully CJIS compliant.

AUDIT TRAIL AND CHAIN OF CUSTODY

Data is tamper-proof and all access events are reported in a secure audit trail.

CUSTOMIZABLE USER PERMISSIONS

Administrators can determine what files can be viewed by users and groups of users.

DATA ENCRYPTION

All information is fully encrypted in transit and at rest.

http://store-images.s-microsoft.com/image/apps.14580.df8a45c6-4243-47a8-9c25-cf048c5fb790.10d45871-2f50-4fc9-9a5b-7bd9bd23c9d9.deb28200-ff66-4b10-9e96-ff29fe7fc885
http://store-images.s-microsoft.com/image/apps.14580.df8a45c6-4243-47a8-9c25-cf048c5fb790.10d45871-2f50-4fc9-9a5b-7bd9bd23c9d9.deb28200-ff66-4b10-9e96-ff29fe7fc885