How cybersecurity priorities are evolving in Indonesia: Axidian at CyberX Global

Yulia Kondrashova

Content and Community Manager at Axidian

Axidian took part in CyberX Global Indonesia, a regional event focused on cybersecurity, digital resilience, and enterprise risk management.

Kirill Bondarenko, Regional Director at Axidian, represented the company and worked with local teams and partners during the event.

In addition to on-site engagement, Kirill Bondarenko, Regional Director at Axidian, took part as a speaker in the leadership panel “Defending the Enterprise in an Era of Intelligent Cyber Threats.” 

The discussion focused on how organizations can strengthen resilience, anticipate emerging risks, and respond to increasingly adaptive and automated attack techniques. 

Security teams are dealing with implementation gaps, not strategy gaps

In Indonesia, the challenge is not a lack of security tools or awareness.The challenge is how everything works together inside real infrastructure.

Organizations already have:

  • multiple security solutions in place
  • defined policies and controls
  • regulatory requirements they need to meet

But these elements are often implemented separately — without a unified structure. This creates gaps not at the strategic level, but at the operational level.

Access control breaks down across complex environments

As infrastructure grows, access becomes harder to manage consistently.

Typical situations include:

  • different authentication methods across systems
  • legacy applications alongside modern platforms
  • multiple teams managing access independently

In these conditions, access control is no longer a single system — it becomes a set of disconnected mechanisms.And that’s where risks start to accumulate.

Privileged accounts play a central role here. They provide direct control over systems and are often spread across environments without centralized oversight.

How Axidian structures access across systems

In this context, the goal is not to add new tools, but to organize what already exists.

Axidian approaches this through:

  • centralized control of privileged and user access
  • integration with existing infrastructure
  • unified authentication mechanisms
  • consistent logging and monitoring of access activity

For example, centralized access management allows organizations to define access rules, enforce authentication policies, and track activity across systems from a single point.

This turns fragmented access into a controlled and auditable process.

Managing access is the hardest part of scaling security

The main issue is not deploying security solutions. It is maintaining control as infrastructure grows.

Axidian addresses these challenges through a set of solutions focused on improving identity and access control across complex infrastructures. This includes Axidian Privilege (PAM) for managing and monitoring privileged accounts, Axidian Access (IAM) for centralized authentication and access control, Axidian Shield (ITDR) for detecting identity-based threats, and Axidian CertiFlow (PKI) for managing digital certificates and trust infrastructure. 

Together, these solutions help organizations bring structure, visibility, and control to how access is managed in real environments.

About the Author

Yulia Kondrashova

Content and Community Manager at Axidian

Over three years of experience in cybersecurity and content creation, with expertise in identity security. Focused on developing educational content that makes complex security topics clear, relevant, and practical for professionals.