The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected […]

The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected […]
For decades PKI has remained one of the most effective technologies for authentication of users and devices. Nevertheless, many companies witness that the PKI evolution does not go […]
In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for decades already. However, […]
Axidian and Corporate Systems are pleased to announce that they have entered into a strategic partnership, combining Corporate Systems’ best-in-class consulting services and deep technical expertise with Axidian […]
Pacific Tech and Axidian enter into a partnership that brings together Axidian cutting-edge cybersecurity products and Pacific Tech’s top-class distribution services. At Pacific Tech, we are continuously evolving […]
Companies having PKI in place frequently use time attendance and access control systems. Unfortunately to employees and administrators, it is of common practice when users simultaneously have several […]
It turns out you can.Of course, physical smart cards and USB-tokens still occupy the majority of the PKI market. They are traditional ‘carriers’ of users’ personal certificates and […]
In the new release, we continue upscaling the Axidian Privilege functionality. New important access control features, expanded user session management options, and improved user experience for a number […]
Let’s face it. Many cybersecurity and IT departments were not prepared for rapid changes that the pandemic crisis has caused. Security officers all around the world witness the […]
What if you’ve had one tool for managing access of employees and customers? Or a tool providing strong and multi-factor authentication with additional functionality at hand? Axidian Access […]