News

The modern world runs on a web of connections. Our supply chains are vast and complex, from the software we use daily to the parts that build our cars. A single compromised software can trouble your entire organization by interrupting operations and exposing sensitive data. These disruptions not only cause financial losses but also erode customer trust. This is the chilling reality of supply chain attacks. However, implementation of PAM can help organizations to safeguard critical systems


Read Complete article

Axidian introduces Axidian Privilege 2.9.

Now you can select FreeIPA directory service as a user directory. This means that now Axidian Privilege can be installed not only on Windows, but also on any Linux distribution with Docker support.

Axidian introduced a new component RDP Proxy, which is based on freely distributed software. This component allows administrators to control connections to protected resources via the RDP protocol.

User groups feature is upgraded. Earlier you


Read Complete article

Axidian Privilege 2.8: Simplifying Resource Management and Access Control
Posted by anna.vlasenko on 28 June 2023 03:52 PM

Axidian presents a new version of Axidian Privilege, Axidian Privilege 2.8.

Migration to .NET 6

Axidian Privilege 2.8 is now powered by .NET 6, the latest version of Microsoft’s software development platform. This upgrade has enhanced the platform’s productivity and efficiency, providing users with a superior experience through state-of-the-art features and tools. 

User authentication support with RADIUS

Axidian Privilege 2.8 supports user authentication with RADIUS. You can


Read Complete article

The Central Bank of Bahrain (CBB) has several rulebooks that outline the regulatory framework for financial institutions operating in Bahrain. These rulebooks serve as a comprehensive set of regulations and guidelines covering various aspects of banking, insurance, capital markets, and other financial activities. A part of it encompasses recommended procedures for safeguarding sensitive information, securing transactions, and identifying vulnerabilities in the cybersecurity policy of


Read Complete article

Back in September Indeed Identity team participated in IDC Summit in Turkey as a silver sponsor together with our partners vMind. After that we met with Volkan Duman, vMind General Manager, to review the main topics that were discussed during the event and the state of the information security market in Turkey, the main trends of the outgoing year and the expected course of things in 2023.

What is your overall impression of the IDC Summit this year? What do you think was the main focus
Read Complete article

CxO Round Table in Turkey by vMind and Indeed Identity
Posted by anna.vlasenko on 15 December 2022 04:57 PM

Indeed Identity joined CxO Round Table in Turkey organized together with our partners vMind under the moderation of BThaber. As one of the event sponsors, Indeed Identity was present at the roundtable discussion and represented by Konstantin Krasovskij, EMEA Director, Pavel Konyukhov, CTO and Anna Surovova, Head of global sales and partnerships.

Together with vMind, we have been delivering authentication and comprehensive access control, privileged access management (PAM) and PKI management


Read Complete article

Indeed Identity presents a new version of Indeed Privileged Access Manager, Indeed PAM 2.7. The new release features multiple innovations. For example, it can be partially installed on Linux and supports application-to-application password management. We have also added a few more supported functions and protocols and enhanced user and administrator interfaces for optimal user-friendliness.

Using Linux-based systems for Indeed PAM control server

Version 2.7 enables you to install


Read Complete article

On 29th of September Indeed Identity joined SPG Software Productivity Group and Sophos in Tunisia to host SPG Business Security Days at the Novotel Lac Tunis hotel. Our director Konstantin Krasovskij talked about the importance of privileged access management and how companies can implement it with minimum effort and maximum benefits. 

The main focus of the presentation was on the most interesting user scenarios connected with access management and authentication of different categories


Read Complete article

5 Important PAM Features You Need to Understand
Posted by anna.vlasenko on 11 May 2022 11:04 AM

Privileged access is still the main target for the cyber criminals, as it leads them to the most critical IT-infrastructure resources. Unfortunately, even though it is a known fact that about 80% of breaches involve access to such accounts, most organizations still put off PAM implementation.

There is no need for a burglar to break the door if it’s kept open, the same way attackers are no longer trying to “hack”, they simply use compromised credentials. At the moment, everyone


Read Complete article

Indeed Identity hosted Business Breakfast together with CreaPlus and OSI.si
Posted by anna.vlasenko on 19 April 2022 03:21 PM

On 14th of April Indeed Identity hosted Business Breakfast together with our long-term partners and friends CreaPlus and OSI.si. During this offline event our director Konstantin Krasovskij talked about three areas of IT security: authentication and comprehensive access management, privileged access management and effective PKI management.

Konstantin described how practical use of authentication and comprehensive access management includes many different aspects that every company has


Read Complete article