Axis Security

San Mateo, CA, USA
2018
Dec 1, 2021   |  By Axis Security
Forescout veterans Jason Pishotti and Omar Fakhri to lead Customer Success Organization; Zscaler veteran Chris Hines to lead Product & Solutions Marketing.
Nov 17, 2021   |  By Axis Security
New VPN Buy Back program makes it simple for the world's IT leaders to fully replace VPN with a cloud-delivered ZTNA service.
Nov 3, 2021   |  By Dor Knafo
The adoption of zero trust is about to change dramatically. In May, the Biden administration announced its cybersecurity Executive Order (EO), stressing the urgency of modernized access and cybersecurity defenses. Consequently, many enterprises can no longer ignore the necessity of investing in zero trust architectures.
Oct 25, 2021   |  By Axis Security
Axis helps IT leaders accelerate to a modern workplace where hybrid work is simple, user experience is a priority, and business data remains protected.
Sep 22, 2021   |  By Axis Security
Axis Security and industry analyst firm Enterprise Strategy Group (ESG) unveil new quantitative survey research of more than 600 cybersecurity, networking, and IT professionals in North America, UK, France, and Germany who are focused on their organizations Secure Access Service Edge (SASE) initiatives.
Sep 16, 2021   |  By Zoltan Kovacs
In Part I, we put on the shoes of a novice hacker and easily exploited a Confluence Server on the public internet, resulting in full network access. We also realize the problem is not specific to a software vendor but rather the common practice of placing servers on the public internet. Make sure to read Confluenza: What is CVE-2021-26084 and why should you care by Gil Azrielant (CTO, Axis Security) for more technical details around this exploit.
Sep 15, 2021   |  By Zoltan Kovacs
It feels like there’s a new story every week about a vulnerability that affects thousands of enterprises. This is great job security for everyone working in InfoSec, as well as anyone on the “other” side! Before we get to the fun stuff, I want to reiterate how vulnerabilities like this can happen to any vendor. We are here to learn from these situations and share insights on how these types of situations can be mitigated.
Sep 13, 2021   |  By Axis Security
Prestigious global award program had 190 applicants from 18 countries, selecting the 16 most innovative companies in cybersecurity.
Sep 8, 2021   |  By Gil Azrielant
Increasingly often, the security world buzzes about a new vulnerability that keeps everyone on their toes.
Aug 17, 2021   |  By Axis Security
Organization Reaffirms Commitment to Security and Privacy for Zero Trust Network Access Solution with SOC 2 Type II and ISO 27001 Certifications.
Aug 18, 2021   |  By Axis Security
Zero Trust network security framework suggests that administrators trust no one and subject all users to full authentication and authorization prior to any user-to-application request. The National Institute of Standards and Technology (NIST) has published recommended best practices organizations can put in place to minimize cyber risk and exposure.
Aug 18, 2021   |  By Axis Security
Business has grown beyond the confines of standard organizations. Now, employees and partners interact with company apps and data from any location (e.g. home offices, customer sites, or partner facilities). But even though many aspects of offsite connectivity have evolved, others desperately need to. While staff and integrated 3rd party remote work models are commonplace, the access models enabling them are outdated and broken.
Jul 1, 2021   |  By Axis Security
Business has grown beyond the confines of standard organizations. Now, employees and partners interact with company apps and data from any location (e.g. home offices, customer sites, or partner facilities). But even though many aspects of offsite connectivity have evolved, others desperately need to. While staff and integrated 3rd party remote work models are commonplace, the access models enabling them are outdated and broken.
Jul 1, 2021   |  By Axis Security
Enterprise private applications vary from big brand accounting applications to industry-specific applications. While many parts of enterprises have undergone digital transformation, the delivery and security of private applications to demanding business users have lagged. Fundamentally, they still rely on legacy security and access methods.
Jun 1, 2021   |  By Axis Security
Before the ink was even dry on the SUNBURST headlines, another threat campaign ("SUPERNOVA"), run by a different threat actor, was discovered. This paper addresses the SolarWinds authentication bypass vulnerability, how SUPERNOVA exploits that vulnerability, and one way organizations can protect themselves against attacks like SUPERNOVA.

Axis delivers the simplest and most powerful Secure Access Service Edge (SASE) service available today, keeping users, resources, and your business productive and safe.

Solve even your most challenging use cases easily with our Application Access Cloud, the industry’s most comprehensive zero trust network access (ZTNA) service.

  • Secure Partner Access for 3rd Parties: Extend application access to partners, contractors, vendors, and more.
  • Accelerate Mergers & Acquisitions: The easy, low-risk way to extend secure application access to users across separate organizations without IT exposure or consolidation.
  • Migrate to Cloud: Migrate and protect critical applications and digital assets from on-prem to the cloud while maintaining business continuity.
  • Enable Remote Work: The fast and simple way to deliver secure application access to employees anywhere they work.

Empower your workforce with modern, simple secure access.