The Axidian Privilege software suite has been updated to Version 2.6. The release includes a lot of improvements and a number of new features that make activity log […]
The Axidian Privilege software suite has been updated to Version 2.6. The release includes a lot of improvements and a number of new features that make activity log […]
Usability is an important attribute of any software. In addition to enhancing the functionality of Axidian Privilege with each new release, we aim to make it more user-friendly […]
Axidian presents a new version of Axidian Privilege. Axidian Privilege 2.5 offers enhanced access policy mechanisms, new features and improvements in the user and administrator interface, as well […]
Axidian Privilege keeps on going in line with the cybersecurity trends. We are committed to continuous product improvement so that our customers enjoy enhanced and user-friendly privileged access […]
In June 2013, the Monetary Authority of Singapore (MAS) introduced the Technology Risk Management Guidelines, a comprehensive document setting out risk management principles. It contains best practices to […]
In the new release, we continue upscaling the Axidian Privilege functionality. New important access control features, expanded user session management options, and improved user experience for a number […]
It is a wide-spread misconception that small and medium enterprises should not focus on enhancing cybersecurity. Operating business and providing services to customers means being on the hackers’ […]
Welcome to the free online webinar “Conquering cyber threats in the new normal” prepared by Pointwest and Axidian, leading companies with expertise in cybersecurity. In regard to the […]
We are happy to announce the new version of Axidian Privilege, a software suite for managing privileged accounts. Version 2.1 introduces PostgreSQL storage support, import of resources from […]
Privileged users whether they are business users, system administrators or contractors undoubtedly have the ability to make sweeping and fundamental changes to IT systems on which the business […]