Contact

The toughest jobs need the tightest security

Security from end-to-end

diagram of Security protocols for Aviadrones X10 AND Aviadrones dock and Cloud Software

Aviadrones products are secure by design, safeguarding each layer of the UAS stack against external threats. From the way we source parts to the way we develop software, security is integrated from end-to-end to ensure the confidentiality, integrity, and availability of your data.

The most demanding organizations in the world trust Aviadrones because:

  1. Aviadrones is committed to meeting the security needs of all of our customers
  2. Strong encryption is used both in transit and at rest
  3. All customer data resides in the Secure data banks both offline and cloud based
  4. Our security is validated by best-in-class security auditors and penetration testers
  5. User login can be configured to customer standards with Single Sign On (SSO) support for SAML, OIDC, and Axon Connect.


Trusted Suppliers

Aviadrones partners with trusted suppliers who adhere to rigorous security and quality standards. Our sourcing process ensures components meet or exceed regulatory requirements, maintaining top-tier reliability and security.

Secure Development

Aviadrones products integrate security practices and considerations throughout the entire software development process. Our secure development practices identify and remediate security vulnerabilities and risks early in the development process, making our products secure, robust, and reliable.

Secure Connectivity

Aviadrones.’s hardware communicates using secure AES-encrypted wireless links. Aviadrones.Link utilizes AES-256 bit encryption for both Aviadrones Dock and Controller operations.

Secure Updates

Software and firmware updates are digitally signed and verified to protect against unauthorized or malicious updates and enhance security and integrity.

Cloud

Hosted on secure infrastructure in the U.S.

We protect your data in transit and at rest within Aviadrones Cloud where our customers manage their fleet, sync media from flights, view and share live streams from current flights, and remotely control Drones through teleoperation.

Hosting &Security

Aviadrones Cloud is SOC2 Type II certified and is hosted in the United States on Amazon Web Services infrastructure. Aviadrones Cloud operates out of AWS US-West and customer data is encrypted with AES-256 encryption and continually backed up to AWS US-East. Customer data is our most protected information at Aviadrones., all access is carefully monitored and controlled.

Data Encryption

Data is protected in transit with TLS 1.2/1.3 encryption (non-weak ciphers). Data uploaded to Aviadrones Cloud is encrypted at rest with AES-256 encryption.

API Integration

Aviadrones offers a RESTful Aviadrones Cloud API, which allows customers to programmatically interact with Aviadrones Cloud securely. Amongst a wide range of functions, Aviadrones Cloud API allows customers to download and delete data from Aviadrones Cloud through our Aviadrones Cloud API.

Enterprise Single Sign-On

Aviadrones 's enterprise SSO solution enhances security and simplifies user access with support for SAML and OIDC protocols, enabling seamless integration with identity providers like Axon Connect, Okta, and Microsoft Entra. These protocols ensure efficient identity management, authentication, and robust security for drone operations.

Compliance

Meeting the highest security standards

Aviadrones is committed to earning best-in-class security compliance certifications from industry-standard evaluators. Our customers can rest assured that their data is protected by security measures that meet or exceed the highest standards.

SOC2 Compliance

Aviadrones renewed SOC2 Type II certification in 2023. If you wish to view the report, please request a copy from your account representative.

NCAA, NSA, and FAA Approved

Aviadrones meets the stringent standards set by the NCAA, NSA, and FAA, ensuring compliance with industry regulations. In 2023, we successfully completed the ISO 27001:2022 certification audit. To request a copy of our certification, please contact your account representative. Our dedicated experts provide continuous support, from installation to daily operations.

Vulnerability Management

We regularly scan our network and cloud systems, promptly addressing and resolving any identified vulnerabilities or threats.

What team would you like to contact today?

Support