In the new version, we continue upscaling the Axidian CertiFlow functionality. The new features will make it easier to manage your public key infrastructure. Please keep reading to […]

In the new version, we continue upscaling the Axidian CertiFlow functionality. The new features will make it easier to manage your public key infrastructure. Please keep reading to […]
In today’s world of complex digital ecosystems, PKI management appears to be a strongly effective security system that is fastly evolving. The evolution creates the growing gap between […]
At the beginning of December Konstantin Krasovskij, our EMEA Director, visited Trustech – a mix of trade show and conference, TRUSTECH showcases the latest hardware and technologies involved […]
A little over a year ago, we released a brand new update of our software suite designed for strong employee authentication. The solution has reached a new level […]
The Axidian Privilege software suite has been updated to Version 2.6. The release includes a lot of improvements and a number of new features that make activity log […]
For most companies PAM is something that is associated with creating borders or limitations. Often organizations are forced to implement PAM due to the legal regulations and do […]
Our EMEA Director, Konstantin Krasovskij presented on the Expert Stage at EIC2021. Konstantin discussed the importance of building a new mindset on PAM implementation and gave some tips […]
Usability is an important attribute of any software. In addition to enhancing the functionality of Axidian Privilege with each new release, we aim to make it more user-friendly […]
Axidian presents a new version of Axidian Privilege. Axidian Privilege 2.5 offers enhanced access policy mechanisms, new features and improvements in the user and administrator interface, as well […]
The growing importance of implementing privileged access management at the corporate level is noted by leading cybersecurity analytics. They mention that “by 2024, organizations that use privileged task […]