Southeast Asia in Focus: Axidian in Indonesia and Malaysia

Yulia Kondrashova

Content and Community Manager at Axidian

From January 29 to February 3, Axidian visited Southeast Asia, covering Malaysia and Indonesia.

Kirill Bondarenko, Regional Director, represented the company at CISO Malaysia 2026 by Corinium Global Intelligence and held a series of strategic meetings across both countries.

The purpose of the trip was to listen to the market, understand regional priorities, and better align Axidian’s solutions with local cybersecurity realities.

Malaysia: structured dialogue and regulatory awareness

In Malaysia, Axidian participated in CISO Malaysia 2026, a focused industry event bringing together cybersecurity vendors and security leaders.

The Malaysian market demonstrates a structured and regulation-aware approach to cybersecurity.

What stood out most during the event:

  • Compliance expectations
  • On-premise infrastructure strategies
  • Identity and access governance
  • Operational resilience

Many organizations operate mature security environments and are actively refining their access management strategies rather than starting from scratch. The emphasis was practical and operational. Security leaders evaluate vendors not only by feature sets but by their ability to align with regulatory frameworks and long-term infrastructure strategies.

For Axidian, it was particularly valuable to observe how Malaysian stakeholders prioritize structured governance and how carefully they assess deployment models, especially in environments where on-prem infrastructure remains dominant.

Indonesia: scale and executive-level involvement

Indonesia offered a different dynamic.

The country’s scale translates into a broad and diverse cybersecurity landscape. During the visit, Axidian conducted a focused roadshow format, engaging directly with security teams and executive stakeholders.

One notable observation was the level of cross-functional involvement in meetings. Executive leadership, IT infrastructure heads, architects, and commercial representatives were often present simultaneously. This reflects how cybersecurity decisions in Indonesia are approached as strategic, organization-wide initiatives rather than isolated technical upgrades.

From the meetings in Indonesia, Axidian drew several important conclusions:

  • Regulatory requirements in financial services strongly influence technology decisions
  • Privileged access governance is treated as a structural necessity
  • Security initiatives are evaluated at the executive level
  • Infrastructure planning remains largely on-premise and long-term

The financial sector, in particular, demonstrates a clearly defined regulatory environment that shapes architectural choices. Access governance and privileged account control are viewed as core elements of operational stability.

Understanding local priorities shapes future engagement

The most valuable outcome of the trip was the deeper understanding of what concerns local cybersecurity professionals and how they define priorities.

Security leaders in the region expect vendors to understand regulatory nuances, deployment realities, and operational constraints. Generic positioning does not resonate. Practical alignment does.

Malaysia and Indonesia differ in scale and structure, but both markets demonstrate a thoughtful and increasingly mature approach to cybersecurity governance.

Sustainable regional growth begins with listening. By engaging directly with cybersecurity leaders and understanding their priorities, Axidian ensure that its solutions remain relevant, practical, and aligned with regional expectations.

As Axidian continues to expand its presence in Southeast Asia, the company brings practical expertise in privileged access management, centralized authentication, and access governance.

Insights gained during the visit to Malaysia and Indonesia will help further adapt these solutions to regional requirements and partner ecosystems.

About the Author

Yulia Kondrashova

Content and Community Manager at Axidian

Over three years of experience in cybersecurity and content creation, with expertise in identity security. Focused on developing educational content that makes complex security topics clear, relevant, and practical for professionals.