News
Axidian introduces Axidian Privilege 2.9.

Now you can select FreeIPA directory service as a user directory. This means that now Axidian Privilege can be installed not only on Windows, but also on any Linux distribution with Docker support.

Axidian introduced a new component RDP Proxy, which is based on freely distributed software. This component allows administrators to control connections to protected resources via the RDP protocol.

User groups feature is upgraded. Earlier you


Read Complete article

Axidian and vMind Hosted C-Level IT Security Summit in Turkey
Posted by tatyana on 05 October 2023 06:46 PM

On the 26th of September, in partnership with vMind, we had the privilege of hosting the C-Level Security Summit in Turkey – an event dedicated to exploring the future of cybersecurity with a focus on the latest Identity and Access Management (IAM) and Privileged Access Management (PAM) trends.

Our Head of Global Sales and Partnerships, Anna Surovova, and EMEA Director, Konstantin Krasovskij, brought their expertise to the forefront. The discussions were not just presentations; they were a deep


Read Complete article

Axidian Privilege 2.8: Simplifying Resource Management and Access Control
Posted by anna.vlasenko on 28 June 2023 03:52 PM

Axidian presents a new version of Axidian Privilege, Axidian Privilege 2.8.

Migration to .NET 6

Axidian Privilege 2.8 is now powered by .NET 6, the latest version of Microsoft’s software development platform. This upgrade has enhanced the platform’s productivity and efficiency, providing users with a superior experience through state-of-the-art features and tools. 

User authentication support with RADIUS

Axidian Privilege 2.8 supports user authentication with RADIUS. You can


Read Complete article

The Central Bank of Bahrain (CBB) has several rulebooks that outline the regulatory framework for financial institutions operating in Bahrain. These rulebooks serve as a comprehensive set of regulations and guidelines covering various aspects of banking, insurance, capital markets, and other financial activities. A part of it encompasses recommended procedures for safeguarding sensitive information, securing transactions, and identifying vulnerabilities in the cybersecurity policy of


Read Complete article

Back in September Indeed Identity team participated in IDC Summit in Turkey as a silver sponsor together with our partners vMind. After that we met with Volkan Duman, vMind General Manager, to review the main topics that were discussed during the event and the state of the information security market in Turkey, the main trends of the outgoing year and the expected course of things in 2023.

What is your overall impression of the IDC Summit this year? What do you think was the main focus
Read Complete article

Indeed Identity presents a new version of Indeed Privileged Access Manager, Indeed PAM 2.7. The new release features multiple innovations. For example, it can be partially installed on Linux and supports application-to-application password management. We have also added a few more supported functions and protocols and enhanced user and administrator interfaces for optimal user-friendliness.

Using Linux-based systems for Indeed PAM control server

Version 2.7 enables you to install


Read Complete article

5 Important PAM Features You Need to Understand
Posted by anna.vlasenko on 11 May 2022 11:04 AM

Privileged access is still the main target for the cyber criminals, as it leads them to the most critical IT-infrastructure resources. Unfortunately, even though it is a known fact that about 80% of breaches involve access to such accounts, most organizations still put off PAM implementation.

There is no need for a burglar to break the door if it’s kept open, the same way attackers are no longer trying to “hack”, they simply use compromised credentials. At the moment, everyone


Read Complete article

Indeed Identity hosted Business Breakfast together with CreaPlus and OSI.si
Posted by anna.vlasenko on 19 April 2022 03:21 PM

On 14th of April Indeed Identity hosted Business Breakfast together with our long-term partners and friends CreaPlus and OSI.si. During this offline event our director Konstantin Krasovskij talked about three areas of IT security: authentication and comprehensive access management, privileged access management and effective PKI management.

Konstantin described how practical use of authentication and comprehensive access management includes many different aspects that every company has


Read Complete article

Privileged users whether they are business users, system administrators or contractors undoubtedly have the ability to make sweeping and fundamental changes to IT systems on which the business may depend. Ask any IT manager and he/she will agree with it. So how come that privilege misuse is still one of the 3 top-patterns most often associated with breaches?

If you also understand the big risks of unregulated privileged accounts and if you want to be 100% aware of all their


Read Complete article

Password management for privileged users is the best practice
Posted by anna.vlasenko on 29 April 2019 03:36 PM

Almost all of business critical data is stored in various information systems of a company. Business scaling leads to a need to delegate administrative responsibilities to subordinates completely or partially, or extend the privileges of top management employees. 

Therefore the heads of departments that use privileged accounts get access to additional confidential data. It is often the case that the access is granted without using a reliable system of controlling the


Read Complete article