Product reviews, deals and the latest tech news

The automated identity and access management platform from Axiom is released

Coming out of stealth today is Axiom, a Tel Aviv-based business that specialises in automating identity and access management (IAM) for developer platforms and has raised $7 million in a round round sponsored by S Capital.

The goal is to offer a unified environment where security and operations teams can be certain that their data is as safe as possible while still giving developers simple access to the tools they need. Axiom claims to seamlessly coordinate cloud and SaaS IAM, providing developers with the least-privileged access while still enabling them to get their job done without friction. This lessens the attack surface and the impact of any possible security breaches.

Axiom’s JTA permissions and seamless connection with popular chat apps like Slack make this possible for developers. Kubernetes, GitLab, Bitbucket, Jira, and ServiceNow are just some of the platforms and technologies that the firm’s offerings are compatible with. Similarly, MySQL, PostgreSQL, MongoDB, Snowflake, and Databricks are among the database and data lake platforms that the company supports. Right now, Axiom is primarily aimed at DevOps and DevSecOps groups at mid-sized businesses.

“Two megatrends are colliding to change the way we work,” said Haim Sadger. “The evolution of the Cloud, where infrastructure has become far more elastic and scalable than ever, and the evolution of the workforce, where continued adoption of a hybrid IT model has made identity the new perimeter. Axiom works at the intersection of those megatrends to enable a new era of productive security for everyone.”

Itay Mesika (CEO) and Ilan Dardik (CTO) met in the Israeli Air Force’s technological unit and went on to found the company. After holding various positions in the sector, the two founders set out to solve an issue they were running across in their day-to-day work. They saw a common pattern: the infrastructure has gotten more dynamic over the last several years, but identity management has lagged behind.

With the advent of elastic and scalable infrastructure, “you have that hybrid IT paradigm that you’re beginning to see more and more of following COVID,” Mesika said. This has led to a proliferation of dynamic identities. Because of these two factors, individuals’ identities are becoming the primary target of malicious activity. Identity and access management (IAM) is the glue that links identities and the cloud, but it has lagged behind and become a bottleneck for users.

Though the basic concepts aren’t novel, he observed, businesses are having trouble keeping up with the ever-changing demands of cloud access, especially if they are still using largely manual procedures. Modern zero trust technologies aid organisations in determining which users should have access to a certain technology, but they don’t provide guidance on what level of access those users should have.

“We have more holistic way of solving the process of cloud access,” Mesika said.” We do this by providing dev, sec and ops teams with an easy-to-use platform that automatically orchestrates all the operations around IAM for cloud and SaaS. We’re minimizing the operational overhead for the security team and also minimizing, at the same time, the user friction and frustration for developers.”