The roundtable «Evolution of Trust: Get ready for PKI 2.0» was about the most confusing, yet vital topics that remain puzzles to many cybersecurity experts. Has COVID-19 affected […]
Interview: CMS Expert Answers the Most Tricky PKI Questions
For decades PKI has remained one of the most effective technologies for authentication of users and devices. Nevertheless, many companies witness that the PKI evolution does not go […]
Roundtable: Evolution of Trust. Get ready for PKI 2.0
In the digital era, PKI is one of the most effective technologies for authentication of users and devices that is used by worldwide companies for decades already. However, […]
Axidian and Corporate Systems enter into business partnership
Axidian and Corporate Systems are pleased to announce that they have entered into a strategic partnership, combining Corporate Systems’ best-in-class consulting services and deep technical expertise with Axidian […]
Pacific Tech and Axidian announce strategic partnership
Pacific Tech and Axidian enter into a partnership that brings together Axidian cutting-edge cybersecurity products and Pacific Tech’s top-class distribution services. At Pacific Tech, we are continuously evolving […]
Mixed PKI environment is not a challenge: Axidian CertiFlow expands PKI best practices
Companies having PKI in place frequently use time attendance and access control systems. Unfortunately to employees and administrators, it is of common practice when users simultaneously have several […]
Can you imagine PKI without physical cards?
It turns out you can.Of course, physical smart cards and USB-tokens still occupy the majority of the PKI market. They are traditional ‘carriers’ of users’ personal certificates and […]
Axidian Privilege 2.3: enhanced tool for comprehensive cybersecurity
In the new release, we continue upscaling the Axidian Privilege functionality. New important access control features, expanded user session management options, and improved user experience for a number […]
How to choose the most cost-effective PAM licensing model
Let’s face it. Many cybersecurity and IT departments were not prepared for rapid changes that the pandemic crisis has caused. Security officers all around the world witness the […]
Webinar: 5 coolest features every access management software should have
What if you’ve had one tool for managing access of employees and customers? Or a tool providing strong and multi-factor authentication with additional functionality at hand? Axidian Access […]