A little over a year ago, we released a brand new update of our software suite designed for strong employee authentication. The solution has reached a new level […]
Axidian Privilege 2.6: modern response to potential threats
The Axidian Privilege software suite has been updated to Version 2.6. The release includes a lot of improvements and a number of new features that make activity log […]
Building Mindset for Privileged Account Management
For most companies PAM is something that is associated with creating borders or limitations. Often organizations are forced to implement PAM due to the legal regulations and do […]
Axidian presentation about PAM implementation mindset on the Expert Stage at EIC2021
Our EMEA Director, Konstantin Krasovskij presented on the Expert Stage at EIC2021. Konstantin discussed the importance of building a new mindset on PAM implementation and gave some tips […]
Axidian Privilege Desktop Console: security and usability that go hand in hand
Usability is an important attribute of any software. In addition to enhancing the functionality of Axidian Privilege with each new release, we aim to make it more user-friendly […]
Axidian Privilege 2.5: user experience is a key to resilient cybersecurity
Axidian presents a new version of Axidian Privilege. Axidian Privilege 2.5 offers enhanced access policy mechanisms, new features and improvements in the user and administrator interface, as well […]
Video: “PAM is a key driver to have a compliant and secure environment”
The growing importance of implementing privileged access management at the corporate level is noted by leading cybersecurity analytics. They mention that “by 2024, organizations that use privileged task […]
Video: Why is PAM a must-have for Singaporean financial sector?
The misuse of privileges remains one of the most common causes of data breaches and it is involved in 74% of data breaches worldwide. Singaporean authorities understand the […]
Axidian Privilege 2.4: your fastest way to the future of cybersecurity
Axidian Privilege keeps on going in line with the cybersecurity trends. We are committed to continuous product improvement so that our customers enjoy enhanced and user-friendly privileged access […]
Roundtable: Best PAM approach – what requires your full attention
Privileged access management is an important part of any cybersecurity policy. With the PAM market predicted to continue rapidly growing in the upcoming years, PAM implementation the #1 […]