Welcome!

News Feed Item

EVIDENCE.com Expands Its Cloud-Based "Virtual Evidence Room"

Allows Secure Transfer of Sensitive Electronic Files by Law Enforcement to District Attorneys

SEATTLE, WA -- (Marketwired) -- 02/19/14 -- Recognizing that law enforcement agencies often rely on manual practices to transfer sensitive electronic evidence -- including videos, photos and audio recordings -- to district attorneys (DAs) and other outside parties, EVIDENCE.com, a business unit of TASER (NASDAQ: TASR) today unveiled EVIDENCE.com External Sharing, a new technology built specifically so digital evidence can be securely and instantaneously shared.

Today's announcement means law enforcement can now log into EVIDENCE.com and email secure links that allow DAs, the media or others to access specific files to create virtual evidence rooms. The process is similar to sharing files through widely used consumer cloud-based storage systems like Dropbox, but with powerful security protections incorporated.

"The ability to share evidentiary video through EVIDENCE.com External Sharing to the Commonwealth Attorney has proven invaluable for our agency," said Detective Melissa Clemens from the Newport News Police Department, one of the beta testing agencies during the past several months. "Because we no longer need to burn disks and devote officer time to transporting them around, we can re-focus those resources on other pressing police work. Most importantly, using this new technology has increased the number of cases that end in plea deals. This reduces our officers' time in court since we can get the evidence in front of the prosecutors immediately."

"This new functionality modernizes a time and money wasting process, by erasing inefficiencies and giving time back to officers so they can focus on actual police work, not administrative activities," said Jason Droege, President of EVIDENCE.com.

In addition to leveraging the cloud for its secure data center, EVIDENCE.com draws on wearable technology and smart-phone applications for its arsenal of digital-evidence collection and management tools available to law enforcement.

AXON body worn video cameras allow officers to easily capture video evidence that then seamlessly uploads to their agencies' EVIDENCE.com account. Additionally, EVIDENCE Mobile™, a free application supported on iOS™ and Android™, turns officers' smart phones into user-friendly, evidence-capturing devices, with secure photo, video and audio-recording capabilities.

"While law enforcement agencies collect and manage growing amounts of digital evidence each year, very little technological innovation has come forward to address this pressing need," said Droege. "EVIDENCE.com is the only technology transforming the way digital evidence is collected and handled. Ultimately we want to save agencies time and money, increase transparency with the public, and help solve more crimes."

For a demo of EVIDENCE.com External Sharing visit: http://www.taser.com/external-sharing.

About EVIDENCE.com

EVIDENCE.com helps public safety agencies capture, manage, and share their digital evidence without the complexity or cost of installing in-house servers. It enables greater transparency through seamless integration with the industry-leading AXON® on-officer cameras.

EVIDENCE.com is the most secure, scalable, and cost-effective solution for managing all types of digital evidence. EVIDENCE.com automates the upload process to ensure security and integrity while keeping officers in the field rather than sitting computers. The evidence can then be tagged, copied, and shared within a secure environment providing full chain-of-custody tracking, audit trail accountability, and role-based security access protocols. EVIDENCE.com enables multiple officers on different devices and at different agencies to collaborate, build a complete case, and securely share the whole incident with the right people in minutes.

EVIDENCE.com is a business unit of TASER International (NASDAQ: TASR) and is headquartered in Seattle, WA with offices in Scottsdale, AZ and Santa Barbara, CA.

Follow EVIDENCE.com

About TASER International, Inc.
TASER protects life: TASER Conducted Electrical Weapons (CEWs) have saved more than 120,000 lives from potential death or serious injury. TASER protects truth: We enable greater transparency with the industry-leading TASER CAM and AXON on officer camera systems. Together with our customers, we are defining the future of smart policing by connecting intelligent devices and sensors with the first secure cloud-based digital evidence management solution for law enforcement: EVIDENCE.com.

Since 1994, more than 260,000 private individuals have relied on TASER technology to protect themselves and their loved ones. Learn more about TASER and its solutions at www.TASER.com and www.EVIDENCE.com or by calling (800) 978-2737.

TASER® is a registered trademark of TASER International, Inc., registered in the U.S. All rights reserved. TASER logo, TASER® CAM™, AXON® and EVIDENCE Mobile™ are trademarks of TASER International, Inc.

Note to Investors

Please visit http://investor.taser.com, http://blog.taser.com, www.twitter.com/taser_ir, www.twitter.com/officialtaser and https://www.facebook.com/TASER.International where TASER discloses information from time to time about the company, its financial information, and its business.

Visit our Investor Relations Safe Harbor Statement at: investor.taser.com/safeHarbor.cfm

For investor relations information please contact Erin Curtis by phone at 480-515-6330 or via email at [email protected].

Embedded Video Available

Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=2522632

Add to Digg Bookmark with del.icio.us Add to Newsvine

CONTACT:
Steve Tuttle
Vice President of Communications
TASER International, Inc.
Media ONLY Hotline: (480) 444-4000
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web ...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Phil Hombledal, Solution Architect at CollabNet, discussed how customers are able to achieve a level of transparency that e...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...