News

At Axidian, we’ve always believed in the power of meaningful connections within the cybersecurity community — and GITEX 2024 was no exception. As a key player in the field of identity security, we couldn’t pass up the chance to showcase our latest innovations and particularly our ITDR solution, Axidian Shield.

Held in the UAE — where we’re proudly based — GITEX 2024 provided us with the perfect platform to connect with industry leaders, share our expertise in identity security, and


Read Complete article

Interview: Axidian CEO About the Future of Identity Security and ITDR
Posted by Yulia Kondrashova on 21 November 2024 09:37 PM

At this year’s GITEX Georgy Ovanesyan, our visionary CEO, gave an interview to the local news provider AIT News. They delved into Axidian’s role in shaping the future of cybersecurity, emerging industry trends, and the importance of our participation in GITEX. Of course, we couldn’t miss the chance to spotlight our latest innovation — Axidian Shield, our cutting-edge Identity Threat Detection and Response (ITDR) solution.

In case you missed it, here’s the full interview, complete with


Read Complete article

Axidian at CyberX India: Strengthening Identity Security and Collaboration
Posted by Yulia Kondrashova on 19 November 2024 01:17 PM

On November 8th, the Axidian team, in collaboration with our partners RP Tech, participated in CyberX India in Bengaluru as a proud Gold Sponsor. This year’s event was an outstanding gathering of over 200+ leading cybersecurity experts from Delhi and Bengaluru. We’re excited to share our key takeaways from this remarkable experience.

A Productive Workshop and Industry Insights

During the event, Anna and Kirill presented our new product – Axidian Shield, to the Indian market.


Read Complete article

Axidian introduces version 8.2.6 of Axidian Access

With this release, you can now send OTPs by using a custom script through the Messages Proxy web application. This allows you to integrate with any corporate system for delivering one-time passwords.

The updated version includes the new feature that enables you to manually specify a link to register Indeed Key and Secured TOTP, as well as to download the Indeed Key application (iOS and Android). Now you can redirect users to the


Read Complete article

Axidian is Heading to Black Hat in Riyadh: Join Us!
Posted by Yulia Kondrashova on 08 November 2024 05:02 PM

The Axidian team is gearing up for Black Hat Middle East and Africa, taking place in Riyadh, Saudi Arabia, from November 26th to 28th! 

This premier cybersecurity conference is the perfect platform to connect with professionals, explore cutting-edge technologies, and network with key decision-makers — all packed into three action-packed days.

What to Expect at Black Hat

At our stand, we’ll be diving deep into Identity Threat Detection and Response (ITDR) capabilities and


Read Complete article

Explore Identity Security with Axidian at it-sa 2024
Posted by tatyana on 17 October 2024 10:04 PM

Axidian is excited to announce our participation in it-sa 2024. It is one of Europe’s leading trade fairs for IT security, taking place from October 22nd to 24th in Nuremberg, Germany. This event provides a great opportunity to showcase how Axidian’s cutting-edge solutions are helping organizations enhance identity security.

Throughout the event, visitors will have the chance to explore our entire product portfolio. This includes Axidian Privilege (PAM), Axidian Access (IAM),


Read Complete article

Join Us at GITEX 2024 for the Axidian Shield Launch
Posted by tatyana on 12 October 2024 02:40 PM

Axidian is excited to announce its participation at GITEX 2024, taking place from October 14th to 18th at the DWTC. This year, we are proud to launch Axidian Shield. It is our new Identity Threat Detection and Response (ITDR) product designed to help organizations build Zero Trust security.

Axidian Shield offers advanced protection without the need for agents or proxies, making it easier than ever to secure your systems. It effectively detects and stops a wide range of cyberattacks.

Join


Read Complete article

What is ITDR?
Posted by tatyana on 11 September 2024 01:15 PM

In this article, we will talk about a new effective tool for countering cybercriminals,  which allows you to detect vulnerable credentials and attacks on them in real time. 

As many studies show, corporate information security services allocate the lion’s share of their budgets to IAM systems as the number of attacks on credentials is steadily growing. 

Compromise and subsequent use of credentials to access information systems have become central elements of almost any cyberattack.


Read Complete article

What is PAM?
Posted by tatyana on 02 September 2024 09:40 AM

Privileged Access Management is a cyber security strategy that involves the control and security of access rights and approvals for identities, users, accounts, processes, and systems that are of high importance or privileged in an IT environment. With PAM in place, organizations can significantly reduce their attack surface, protecting themselves not only from external attacks but also insider threats. PAM is a subset of Identity and Access Management. Its objective is to offer


Read Complete article

The modern world runs on a web of connections. Our supply chains are vast and complex, from the software we use daily to the parts that build our cars. A single compromised software can trouble your entire organization by interrupting operations and exposing sensitive data. These disruptions not only cause financial losses but also erode customer trust. This is the chilling reality of supply chain attacks. However, implementation of PAM can help organizations to safeguard critical systems


Read Complete article