Live Chat Software by Kayako |
Axidian at CyberX India: Strengthening Identity Security and Collaboration
Posted by Yulia Kondrashova on 19 November 2024 01:17 PM |
|
On November 8th, the Axidian team, in collaboration with our partners RP Tech, participated in CyberX India in Bengaluru as a proud Gold Sponsor. This year’s event was an outstanding gathering of over 200+ leading cybersecurity experts from Delhi and Bengaluru. We’re excited to share our key takeaways from this remarkable experience. A Productive Workshop and Industry InsightsDuring the event, Anna and Kirill presented our new product – Axidian Shield, to the Indian market. Read Complete article | |
Axidian is Heading to Black Hat in Riyadh: Join Us!
Posted by Yulia Kondrashova on 08 November 2024 05:02 PM |
|
The Axidian team is gearing up for Black Hat Middle East and Africa, taking place in Riyadh, Saudi Arabia, from November 26th to 28th! This premier cybersecurity conference is the perfect platform to connect with professionals, explore cutting-edge technologies, and network with key decision-makers — all packed into three action-packed days. What to Expect at Black HatAt our stand, we’ll be diving deep into Identity Threat Detection and Response (ITDR) capabilities and Read Complete article | |
Join Us at GITEX 2024 for the Axidian Shield Launch
Posted by tatyana on 12 October 2024 02:40 PM |
|
Axidian is excited to announce its participation at GITEX 2024, taking place from October 14th to 18th at the DWTC. This year, we are proud to launch Axidian Shield. It is our new Identity Threat Detection and Response (ITDR) product designed to help organizations build Zero Trust security. Axidian Shield offers advanced protection without the need for agents or proxies, making it easier than ever to secure your systems. It effectively detects and stops a wide range of cyberattacks. Join Read Complete article | |
What is ITDR?
Posted by tatyana on 11 September 2024 01:15 PM |
|
In this article, we will talk about a new effective tool for countering cybercriminals, which allows you to detect vulnerable credentials and attacks on them in real time. As many studies show, corporate information security services allocate the lion’s share of their budgets to IAM systems as the number of attacks on credentials is steadily growing. Compromise and subsequent use of credentials to access information systems have become central elements of almost any cyberattack. Read Complete article | |