Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Private Application Access Firm Axis Security Emerges From Stealth

Axis Security, a company that specializes in private application access, emerged from stealth mode on Tuesday with $17 million in funding.

Axis Security, a company that specializes in private application access, emerged from stealth mode on Tuesday with $17 million in funding.

Axis Security is based in San Mateo, California, and its research and development is in Tel Aviv, Israel. The company provides a software-as-a-service (SaaS) solution named Application Access Cloud that is advertised as an alternative to VPN.

“VPNs can be complex, slow to deploy, hard to manage and inflexible, especially when it comes to providing access to third-party supply chain partners, vendors, contractors, and remote employees,” Axis Security said.

Axis’ cloud-native security and analytics platform is designed to help organizations control private application access. It provides a way for users to connect to private apps without touching the network or the applications.

The $17 million in funding includes seed and Series A rounds. The investment comes from venture capital firm Cyberstarts, Ten Eleven Ventures’ Alex Doll, Fireglass founder Dan Amiga, and Michael Fey, former president of Symantec and Blue Coat.

Axis Security says its product is immediately available and the company claims it has already signed up several Fortune 500 companies.

“The Application Access Cloud that Axis has developed gives enterprises the security solution they’ve been looking for: unmatched visibility and control over users by requiring coordinated control over requests, users, policies, and activities,” said Alex Doll, founder and managing general partner at Ten Eleven Ventures.

“We’ve been very impressed by the innovative approach Axis has taken, as well as by how quickly the founding team has gone from concept to development to market validation. It’s a real testament to the magnitude of the challenge posed by the changing nature of enterprise networks and hybrid cloud usage, and the skill of the Axis team in solving it with an identity-forward approach to modern application security,” Doll added.

Advertisement. Scroll to continue reading.

Related: Data Security Startup Privafy Emerges From Stealth Mode

Related: Email Security Firm Abnormal Security Exits Stealth Mode With $24M in Funding

Related: Data Security Startup Cyral Emerges From Stealth Mode

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.