Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Access Management

Things to Ask Your SSE Vendor: Episode 8: How can I get actual value from my CASB?

CASB can often just be a 4-letter word. With teams across the board struggling to implement CASB effectively (or get it up and running at all), Axis determined to create our solution in a way that makes controlling SaaS access and protecting data in these apps easy for teams managing them.

Things to Ask Your SSE Vendor: Episode 9: What is real visibility for device posture and experience?

Visibility into device health is important for ensuring healthy risk levels when it comes to application access. Knowing the posture of your users devices gives you beneficial criteria in which to base zero trust access policies. Similarly, having visibility into user’s access experience helps teams determine where latency originates allowing for a prescriptive approach to optimizing performance.

The City of San Jose trusts Axis to help power their modern workplace

With over 7,000 employees serving +1 million people, the City of San Jose desperately understands the need for driving digital transformation. Supporting a now mobile workforce, the City recognizes that in order to create a secure and resilient city, it requires a shift in how they approach secure access to applications.

What is OAuth? A Complete Explanation

‍OAuth (pronounced "oh-auth”) is an authorization framework that allows an application to request “secure delegated access” to third-party systems on behalf of the apps’ users or the “resource owner.” Simply put, with OAuth, users can grant websites and applications access to their information on other websites without providing important credentials like passwords. OAuth stands for "Open Authorization”.

Passwordless Authentication with Windows Hello for Business

Passwords are everywhere — and nobody likes them. For users, they are a pain to remember and manage. For businesses, they continue to be a primary source of data breaches, both on premises and in the cloud. In fact, the 2022 Verizon DBIR reports that credential theft was involved in nearly half of all cyberattacks, including third-party breaches, phishing attacks and basic web application attacks.

Increasing Enterprise IoT Security with Identity and Access Management (IAM) Solutions

Internet of things (IoT) application and rollout has been rapid, disrupting and streamlining processes in a variety of industries, However, it has created a situation where “today’s IoT security is lightweight compared to enterprise application security” , creating a need for IoT security solutions than many of the insufficient and fragmented options.

Top 4 Access-Control-Allow Methods

If you’re an IT manager or business owner, chances are external security is always top of your mind. But lately, managing access control of documents for employees has become just as necessary to limit access to information and information processing systems. While cybersecurity breaches are a menacing threat, internal security problems can be equally devastating, making access control measures necessary to mitigate the risk of access without authorization.