The modern world runs on a web of connections. Our supply chains are vast and complex, from the software we use daily to the parts that build our […]
Axidian Privilege 2.10: Unveiling a Suite of Powerful Capabilities
Axidian Privilege 2.10. is now available: Now in addition to Active Directory and FreeIPA, Axidian Privilege supports OpenLDAP and ALD PRO directory services. Another important update introduces Ad […]
Axidian Privilege 2.9: Enhancing Security Horizons with FreeIPA and RDP Innovations
Axidian introduces Axidian Privilege 2.9. Now you can select FreeIPA directory service as a user directory. This means that now Axidian Privilege can be installed not only on […]
Axidian Privilege 2.8: Simplifying Resource Management and Access Control
Axidian presents a new version of Axidian Privilege, Axidian Privilege 2.8. Migration to .NET 6 Axidian Privilege 2.8 is now powered by .NET 6, the latest version of […]
PAM in Bahrain’s Financial Sector: Compliance and Cost-effectiveness Unite
The Central Bank of Bahrain (CBB) has several rulebooks that outline the regulatory framework for financial institutions operating in Bahrain. These rulebooks serve as a comprehensive set of […]
Axidian Privilege 2.7: Empowering Enterprises with Advanced Privileged Access Protection
Axidian presents a new version of Axidian Privilege, Axidian Privilege 2.7. The new release features multiple innovations. For example, it can be partially installed on Linux and supports […]
Axidian Presented Best PAM Practice at Cyber Security World Asia in Singapore
Cyber Security World Asia returned this year and was held on 12th – 13th October 2022 at Marina Bay Sands, Singapore. The event gathered cyber security professionals and […]
Implementing the Principle of Least Privilege is easier than you think
IT security resilience of an organization highly depends on how effectively privileged users work with its IT infrastructure. As the saying goes – with great power comes great […]
5 Important PAM Features You Need to Understand
Privileged access is still the main target for the cyber criminals, as it leads them to the most critical IT-infrastructure resources. Unfortunately, even though it is a known […]
Axidian Privilege 2.6: modern response to potential threats
The Axidian Privilege software suite has been updated to Version 2.6. The release includes a lot of improvements and a number of new features that make activity log […]