Ensuring the highest level of security, Public Key Infrastructure enables core enterprise processes of users’ authentication, encryption and digital signature. Just like any technology, PKI actively evolves and […]

Ensuring the highest level of security, Public Key Infrastructure enables core enterprise processes of users’ authentication, encryption and digital signature. Just like any technology, PKI actively evolves and […]
Smart cards have been a part of the information security market for several decades already and are used by companies for the identification of employees. The evolution of […]
There is currently much controversy over the PKI status in modern cybersecurity which raises a number of curious questions. What is the PKI role in digital transformation? When […]
The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected […]
In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for decades already. However, […]
What if you’ve had one tool for managing access of employees and customers? Or a tool providing strong and multi-factor authentication with additional functionality at hand? Axidian Access […]
We are pleased to invite you to the online webinar “Digital certificate management that is in tune with the times.” prepared by RnTrust and Axidian, the leading cybersecurity […]
Welcome to the free online webinar “Conquering cyber threats in the new normal” prepared by Pointwest and Axidian, leading companies with expertise in cybersecurity. In regard to the […]
We are pleased to invite you to the online webinar “Passwordless authentication: trusted way to security” prepared by Pacific Tech and Axidian, leading companies with the wide expertise […]
Privileged users whether they are business users, system administrators or contractors undoubtedly have the ability to make sweeping and fundamental changes to IT systems on which the business […]