Built on a zero-trust approach, Axis Application Access Cloud offers a new agentless model that delivers the easiest and safest way to connect users anywhere on any device, to Enterprise apps, without ever touching the network or the apps themselves.
FREMONT, CA: Axis Security, the leader in Zero Trust Access, is strengthening its continuous adaptive, secure application access technology with new policy controls based on device security posture and dynamic directory integration, disarm and reconstruct capabilities, and application layer visibility for incident response investigations. These improvements ensure organizations can deliver zero trust access to third-party supply chain partners, contractors, and employees.
The company also is expanding these capabilities through integrations with leading security information and event management (SIEM), identity management, and endpoint security vendors Splunk, Okta, and CrowdStrike to provide organizations with an integrated fabric for securing access to applications via its Application Access Cloud platform.
Axis Security also announced it received an additional $32 million in Series B funding to accelerate growth and meet enterprise demand for Work from Anywhere solutions.
The latest features and new integrations strengthen the end-to-end security of the Axis Application Access Cloud to uniquely ensure granular least privilege access permissions, stronger application protection, and a unique level of visibility into user access and use of corporate applications for incident response and forensic investigations that is unmatched among Zero Trust Network Access vendors.
"Axis is focused on delivering a better, more secure approach to application access at a time when it is badly needed," said DorKnafo, founder and CEO of Axis Security. "Our application approach solves multiple problems not addressed by existing access solutions, such as VPNs, that operate at the network layer. Because our access service operates at the application layer, we offer a unique level of adaptive control, granular visibility and continuous security and we are able to automate and extend those capabilities by integrating with the endpoint, identity, and SIEM solutions that our customers use each and every day."