News

In a recent conversation with BThaber, Konstantin Krasovsky, EU Director at Axidian, discussed the company’s plans for the EU region for 2023. Now that the first quarter of the year is over and the busiest season is approaching, we want to share the highlights of this interview. Konstantin talked about the company’s approach to product development and how it responds to ever-changing IT security risks. In addition, he shed light on the competencies of Axidian, which distinguish it in the


Read Complete article

Back in September Indeed Identity team participated in IDC Summit in Turkey as a silver sponsor together with our partners vMind. After that we met with Volkan Duman, vMind General Manager, to review the main topics that were discussed during the event and the state of the information security market in Turkey, the main trends of the outgoing year and the expected course of things in 2023.

What is your overall impression of the IDC Summit this year? What do you think was the main focus
Read Complete article

Slovenian card payment processor* as part of migration from Microsoft CLM / FIM (EOL) initiated the procedure of purchasing a Card Management System. After the implementation of the Indeed Certificate Manager we decided to ask them to share their experience and decision-making process.

Why did you consider implementing a CMS?

We tend to have an organized environment and have previous experience with MS CMS FIM. Clever, efficient, and secure use of digital certificates is extremely important


Read Complete article

Hackers have always had itchy fingers to damage small to large-scale businesses, and with the COVID-19 pandemic still happening, the situation is getting worse. While the possibility to work from the comfort of your own home is praised by employees, it creates cybersecurity challenges for enterprises.

Some of the most common threats that organizations can become victims of are ransomware, phishing, and data breaches. The consequences of encountering such dangers can be detrimental.


Read Complete article

The growing importance of implementing privileged access management at the corporate level is noted by leading cybersecurity analytics. They mention that “by 2024, organizations that use privileged task automation features will experience 70% fewer breaches than those that don’t.”

The question of whether to have PAM in place is solved. If you want to have a stable business future, PAM is required. However, the selection of PAM is a complex process that can be confusing if you do not


Read Complete article