Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Access Management

Things to Ask Your SSE Vendor: Episode 8: How can I get actual value from my CASB?

CASB can often just be a 4-letter word. With teams across the board struggling to implement CASB effectively (or get it up and running at all), Axis determined to create our solution in a way that makes controlling SaaS access and protecting data in these apps easy for teams managing them.

The City of San Jose trusts Axis to help power their modern workplace

With over 7,000 employees serving +1 million people, the City of San Jose desperately understands the need for driving digital transformation. Supporting a now mobile workforce, the City recognizes that in order to create a secure and resilient city, it requires a shift in how they approach secure access to applications.

What is OAuth? A Complete Explanation

‍OAuth (pronounced "oh-auth”) is an authorization framework that allows an application to request “secure delegated access” to third-party systems on behalf of the apps’ users or the “resource owner.” Simply put, with OAuth, users can grant websites and applications access to their information on other websites without providing important credentials like passwords. OAuth stands for "Open Authorization”.


Passwordless Authentication with Windows Hello for Business

Passwords are everywhere — and nobody likes them. For users, they are a pain to remember and manage. For businesses, they continue to be a primary source of data breaches, both on premises and in the cloud. In fact, the 2022 Verizon DBIR reports that credential theft was involved in nearly half of all cyberattacks, including third-party breaches, phishing attacks and basic web application attacks.


Top 4 Access-Control-Allow Methods

If you’re an IT manager or business owner, chances are external security is always top of your mind. But lately, managing access control of documents for employees has become just as necessary to limit access to information and information processing systems. While cybersecurity breaches are a menacing threat, internal security problems can be equally devastating, making access control measures necessary to mitigate the risk of access without authorization.


What is Privileged Access Management (PAM)? Explained

Privileged access management is a package of cybersecurity strategies and access management tools used for controlling, monitoring, and safeguarding users with privileged access permissions. PAM is widely regarded by analysts and IT teams as a valuable and critical cybersecurity platform, as it's able to achieve high-security ROI.