Get FREE shipping on orders over $100
You are now leaving Lorex.com. Would you like to continue to Lorex’s For Business website?
Get FREE shipping on orders over $100
Security is our utmost priority and we stand with our customers against any cyber threat.
Our education training modules comprise of webinars, tests, and other web-based communication and reinforcement tools. Of these tools, we leverage frequent real-world cybersecurity simulations to our employees to ensure we are fully equipped and resilient to threats. Cybersecurity is a responsibility shared by everyone within our organization.
Every Lorex employee regularly participates in Security and Privacy training to adopt a cybersecurity mindset within our company.
We regularly review and update our security controls and processes according to the latest industry frameworks.
Vulnerability scans are frequently conducted against our mobile applications, firmware, systems, and services by internal and external cybersecurity teams. We also engage with professional third-party cybersecurity teams to conduct Penetration Tests to continuously improve our security posture.
Access to our customers’ data is strictly on a "need-to-know" basis and is further protected by Multi-Factor Authentication (MFA). Please see our Privacy Commitment to learn more.
We are committed to protecting the integrity, privacy, and security of our customers’ information.
We employ a multitude of detection, logging, and response technologies to monitor our services and systems.
Security controls are located on hosted systems, mobile devices, and resources in the cloud to ensure that all areas are continuously being monitored.
Security is our utmost priority and we stand with our customers against any cyber threat.
Every Lorex employee regularly participates in Security and Privacy training to adopt a cybersecurity mindset within our company.
Every Lorex employee regularly participates in Security and Privacy training to adopt a cybersecurity mindset within our company. Our education training modules comprise of webinars, tests, and other web-based communication and reinforcement tools. Of these tools, we leverage frequent real-world cybersecurity simulations to our employees to ensure we are fully equipped and resilient to threats. Cybersecurity is a responsibility shared by everyone within our organization.
We regularly review and update our security controls and processes according to the latest industry frameworks.
Vulnerability scans are frequently conducted against our mobile applications, firmware, systems, and services by internal and external cybersecurity teams. We also engage with professional third-party cybersecurity teams to conduct Penetration Tests to continuously improve our security posture.
We are committed to protecting the integrity, privacy, and security of our customers’ information.
Access to our customers’ data is strictly on a "need-to-know" basis and is further protected by Multi-Factor Authentication (MFA). Please see our Privacy Commitment to learn more.
We employ a multitude of detection, logging, and response technologies to monitor our services and systems.
Security controls are located on hosted systems, mobile devices, and resources in the cloud to ensure that all areas are continuously being monitored.
Found a potential issue? Please help us by reporting it so we can fix it quickly.