Axonius - Experts & Thought Leaders
Latest Axonius news & announcements
Claroty, the cyber-physical systems (CPS) protection company, and Axonius, the pioneer in cybersecurity asset management and SaaS management, announced a new partnership that combines technologies to bring enterprise attack surface management to all assets across an organization’s networks, including IT, cloud, and the Extended Internet of Things (XIoT) — the vast network of CPS including OT, IoT, BMS, and IoMT. By combining Claroty’s knowledge of CPS environments with Axonius’ 1,000+ integrations that extend to the cloud, customers gain a unified view and profile of all assets across environments. Additionally, the platforms extend seamlessly into vulnerability profiling, attack surface exposure visualisation, and management of exposures via protective measures and access controls to limit and segment allowable network communication and drive intelligent and timely incident response. XIoT’s undeniable benefits These organisations are well-protected against and prepared for everything from ransomware “We’re excited to be partnering with Claroty to bring to organisations a unified system of record for securing their digital infrastructure,” said Mark Daggett, Vice President of Worldwide Channel Alliances at Axonius. “Together we deliver a complete and comprehensive asset inventory that powers core controls to help organisations reach a key goal for their security strategy: reduce risk.” The integration of the Claroty and Axonius platforms gives organisations the tools they need to reduce risk and achieve cyber-resilience — meaning they not only survive adverse cyber conditions but they thrive despite them. These organisations are well-protected against and prepared for everything from ransomware and supply chain attacks to insider threats. As a result, they can embrace digital transformation and the XIoT’s undeniable benefits safely, securely, and confidently. Expertise of CPS environments “In an era of remote work, next-gen 5G mobile technology, and a vast cyber-attack connected landscape ranging from on-premise devices to cloud services, understanding exactly what encompasses your hyperconverged connected estate is more challenging and critical than ever before,” said Stephan Goldberg, Vice President of Business Development at Claroty. “The combination of Claroty’s unmatched vertical expertise of CPS environments, their business applications and technology characteristics with Axonius’ ability to provide business-level context to all assets from cloud to on-prem, creates a holistic view of all connected assets, vulnerabilities, and the dynamic attack surface and exposures that is unlike any other offering on the market.”
Aqua Security, the pure-play cloud-native security provider, and the Center for Internet Security (CIS), an independent, nonprofit organisation with a mission to create confidence in the connected world, releases the industry’s first formal guidelines for software supply chain security. Developed through a collaboration between the two organisations, the CIS Software Supply Chain Security Guide provides more than 100 foundational recommendations that can be applied across a variety of commonly used technologies and platforms. Software supply chain In addition, Aqua Security unveiled a new open-source tool, Chain-Bench, which is the first and only tool for auditing the software supply chain to ensure compliance with the new CIS guidelines. The new guidelines establish general best practices that support key emerging standards like SLSA and TUF Although threats to the software supply chain continue to increase, studies show that security across development environments remains low. The new guidelines establish general best practices that support key emerging standards like Supply Chain Levels for Software Artifacts (SLSA) and The Update Framework (TUF) while adding foundational recommendations for setting and auditing configurations on the Benchmark-supported platforms. Supply chain security Within the guide, recommendations span five categories of the software supply chain, including Source Code, Build Pipelines, Dependencies, Artifacts, and Deployment. CIS intends to expand this guidance into more specific CIS Benchmarks to create consistent security recommendations across platforms. As with all CIS guidance, the guide will be published and reviewed globally. Feedback will help ensure that future platform-specific guidance is accurate and relevant. “By publishing the CIS Software Supply Chain Security Guide, CIS and Aqua Security hope to build a vibrant community interested in developing the platform-specific Benchmark guidance to come,” said Phil White, Benchmarks Development Team Manager for CIS. “Any subject matter experts that develop or work with the technologies and platforms that make up the software supply chain are encouraged to join the effort in building out additional benchmarks. Their expertise will be valuable to establishing critical best practices to advance software supply chain security for all.” Secure software releases Chain-Bench scans the DevOps stack from source code to deployment To date, the guide has been reviewed by experts at CIS, Aqua Security, Axonius, PayPal, CyberArk, Red Hat, and other technology firms. Ofir Shapira, Cyber Security Product Manager, Axonius: “The work Aqua is doing around software supply chain security, not only as a company but for the wider community, is paving the way for more secure software releases.” Erez Dasa, Cyber & Application Security Architect, digital payment organisation: “Implementing these guidelines over development processes gives us much more confidence in the security of releases.” To support organisations adopting the CIS guidance, Aqua released Chain-Bench. Chain-Bench scans the DevOps stack from source code to deployment and simplifies compliance with security regulations, standards, and internal policies to ensure teams can consistently implement software security controls and best practices. Stronger security practices “Building software at scale requires strong governance of the software supply chain, and strong governance requires effective tools. This is where we saw an opportunity to add value,” said Eylam Milner, Director Argon Technology, Aqua Security. “We wanted to leverage our expertise in software supply chain security to help build critical guidance for one of industry’s most pressing challenges, as well as a free, accessible tool to help other organisations adhere to it. The work doesn’t stop here. We will continue working with CIS to refine this guidance, so that organisations worldwide can benefit from stronger security practices.”
Axonius, the provider of cybersecurity asset management and SaaS management will address the complexities and security risks associated with controlling SaaS environments against a backdrop of increasing attacks on applications at InfoSecurity Europe, taking place 21-23 June, 2022. On 22 June, 2022, Amir Ofek, CEO of AxoniusX, a business unit within Axonius focused on innovation and growth, will present, ‘How to Solve SaaS Complexity (The Comprehensive Way).’ Taking place at 1.30 pm, Amir will unpack key SaaS challenges and the pitfalls of existing approaches to solving them. SaaS application landscape The event will also provide a forum for Axonius (stand N20) to demonstrate its two core solutions, SaaS Management and Cybersecurity Asset Management: SaaS Management – Making its debut following its launch in January, Axonius SaaS Management helps security, IT, and finance teams solve emerging software-as-a-service challenges, delivering a single source of truth into their SaaS application landscape. Customers can take advantage of a seamless, non-intrusive deployment that delivers actionable insights from day one. Cybersecurity Asset Management – The Axonius core platform, which is fully integrated into the new SaaS Management solution, unifies all digital assets — from SaaS apps to devices, users accounts, cloud assets, and more — so customers have an always up-to-date inventory, are more easily able to uncover security gaps, and can automate actions to defend their entire IT environment. Solving foundational problems Visitors to InfoSecurity Europe will have the opportunity to see why Axonius has quickly become a pioneer in the sector, transforming how companies manage and secure their assets and solving foundational problems for teams struggling to control the complexities of their environments. This is the first time that Axonius has exhibited at the live event and is an indicator of how quickly the company has expanded in EMEA, with 218% growth in the last year. This is supported by a 60% expansion of its channel in the region now led by the recently appointed VP of Sales EMEA, Fabian Libeau.
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download