In the second half of 2019, after the update of Axidian CertiFlow version 5.4.0, we issued a number of technical releases. They have improved the stability of the […]
All News
Axidian Privilege (Axidian Privilege) – version 2.0
We introduce the next version of Axidian Privilege software for access control of privileged users. The main additional features of Axidian Privilege version 2.0 are dedicated SSH Proxy […]
Axidian Privilege – version 1.2
We introduce the next version of Axidian Privilege software for access control of privileged users. The new Axidian Privilege 1.2 version has not only the revision of the […]
CEO of Axidian plans series of partnership meetings in Europe
We are pleased to announce that due to the coordinated work of all our specialists, Axidian activity in Europe has reached a completely new level. Over the past […]
Welcome to Axidian office in Singapore!
The Asia-Pacific cybersecurity market is massively growing, but so does the number of cybersecurity attacks. In view of the expanding threat, we witness the ever-growing interest in our […]
Axidian CertiFlow 5.4
Axidian CertiFlow is a developing system. As the software suite is in demand with many companies, an individual configuration of its components is a must. The latest release […]
Axidian Privilege 1.1
Less than a year ago, we introduced a new software suite to manage access to privileged accounts – Axidian Privilege. The pilot implementations of Axidian Privilege 1.0 were […]
New partnership horizons after Risk 2019 Serbia
On the 29th of May, Axidian had the pleasure of being a bronze sponsor of Risk 2019 Serbia, one of the largest and most visited cybersecurity events in […]
Axidian is ready to repeat success in Risk Serbia in May
Mindshare 2019, cryptovision’s eID and IT Security conference, was held in Germany on the 14-15 of May. For two whole days, everyone who cares about protection against cyber […]
PKI: multiple use cases – single point of management
PKI can be your best friend and worst enemy at the same time: offering a solution for many problems of information security, it also requires proper maintenance which […]