Axis Security

San Mateo, CA, USA
2018
Sep 22, 2021   |  By Axis Security
Axis Security and industry analyst firm Enterprise Strategy Group (ESG) unveil new quantitative survey research of more than 600 cybersecurity, networking, and IT professionals in North America, UK, France, and Germany who are focused on their organizations Secure Access Service Edge (SASE) initiatives.
Sep 16, 2021   |  By Zoltan Kovacs
In Part I, we put on the shoes of a novice hacker and easily exploited a Confluence Server on the public internet, resulting in full network access. We also realize the problem is not specific to a software vendor but rather the common practice of placing servers on the public internet. Make sure to read Confluenza: What is CVE-2021-26084 and why should you care by Gil Azrielant (CTO, Axis Security) for more technical details around this exploit.
Sep 15, 2021   |  By Zoltan Kovacs
It feels like there’s a new story every week about a vulnerability that affects thousands of enterprises. This is great job security for everyone working in InfoSec, as well as anyone on the “other” side! Before we get to the fun stuff, I want to reiterate how vulnerabilities like this can happen to any vendor. We are here to learn from these situations and share insights on how these types of situations can be mitigated.
Sep 13, 2021   |  By Axis Security
Prestigious global award program had 190 applicants from 18 countries, selecting the 16 most innovative companies in cybersecurity.
Sep 8, 2021   |  By Gil Azrielant
Increasingly often, the security world buzzes about a new vulnerability that keeps everyone on their toes.
Aug 17, 2021   |  By Axis Security
Organization Reaffirms Commitment to Security and Privacy for Zero Trust Network Access Solution with SOC 2 Type II and ISO 27001 Certifications.
Jul 23, 2021   |  By John Huang
I built it – and hackers came It’s been an eventful 12 months. With people working from home, there’s been an over 40% surge in machines accessible from the internet running RDP, with RDP attacks up over 400%. 1 This site even has instructions for how to create more than one RDP instance on the same Windows 10 machine. 2 There are also these instructions for Windows 2016, that create a larger attack surface that by allowing multiple RDP connections into the same endpoint.
Jul 6, 2021   |  By Tamir Hardof
2020 saw a number of things that rose more than 1500%: Let’s focus on the latter. According to a new threat intelligence report from Nuspire, and their threat intelligence partner Recorded Future, in Q1 2021, “there was a 1,916% increase in attacks against Fortinet’s SSL-VPN and a 1,527% increase in Pulse Connect Secure VPN. These vulnerabilities allow a threat actor to gain access to a network. Once they are in, they can exfiltrate information and deploy ransomware.”
Jun 28, 2021   |  By Dor Knafo
It should come as no surprise that Gartner estimates that by 2025, three-quarters of large organizations will be actively pursuing a vendor consolidation strategy , up from approximately one-quarter today.
Jun 18, 2021   |  By Deena Thomchick
A Virtual Desktop Infrastructure looks like a great match on paper. What’s not to like? You know where it is on Friday night, with your apps and data on your servers, not cruising the internet or making out on someone’s BYOD. It seems safe since it forces web access through the ‘house’ security stack and requires an ID check at the front door. It can be exclusively available only to users on your network via VPN, SD-WAN, or local network connection.
Aug 18, 2021   |  By Axis Security
Zero Trust network security framework suggests that administrators trust no one and subject all users to full authentication and authorization prior to any user-to-application request. The National Institute of Standards and Technology (NIST) has published recommended best practices organizations can put in place to minimize cyber risk and exposure.
Aug 18, 2021   |  By Axis Security
Business has grown beyond the confines of standard organizations. Now, employees and partners interact with company apps and data from any location (e.g. home offices, customer sites, or partner facilities). But even though many aspects of offsite connectivity have evolved, others desperately need to. While staff and integrated 3rd party remote work models are commonplace, the access models enabling them are outdated and broken.
Jul 1, 2021   |  By Axis Security
Business has grown beyond the confines of standard organizations. Now, employees and partners interact with company apps and data from any location (e.g. home offices, customer sites, or partner facilities). But even though many aspects of offsite connectivity have evolved, others desperately need to. While staff and integrated 3rd party remote work models are commonplace, the access models enabling them are outdated and broken.
Jul 1, 2021   |  By Axis Security
Enterprise private applications vary from big brand accounting applications to industry-specific applications. While many parts of enterprises have undergone digital transformation, the delivery and security of private applications to demanding business users have lagged. Fundamentally, they still rely on legacy security and access methods.
Jun 1, 2021   |  By Axis Security
Before the ink was even dry on the SUNBURST headlines, another threat campaign ("SUPERNOVA"), run by a different threat actor, was discovered. This paper addresses the SolarWinds authentication bypass vulnerability, how SUPERNOVA exploits that vulnerability, and one way organizations can protect themselves against attacks like SUPERNOVA.

Axis delivers the simplest and most powerful Secure Access Service Edge (SASE) service available today, keeping users, resources, and your business productive and safe.

Solve even your most challenging use cases easily with our Application Access Cloud, the industry’s most comprehensive zero trust network access (ZTNA) service.

  • Secure Partner Access for 3rd Parties: Extend application access to partners, contractors, vendors, and more.
  • Accelerate Mergers & Acquisitions: The easy, low-risk way to extend secure application access to users across separate organizations without IT exposure or consolidation.
  • Migrate to Cloud: Migrate and protect critical applications and digital assets from on-prem to the cloud while maintaining business continuity.
  • Enable Remote Work: The fast and simple way to deliver secure application access to employees anywhere they work.

Empower your workforce with modern, simple secure access.