Axis Security Chosen 2020 Red Herring Top 100 North America Winner

SAN MATEO, California – November 23, 2020 – Axis Security, the leader in Zero Trust Access, today announced that it has been named a winner at Red Herring’s Top 100 North America 2020 event recognizing the continent’s most exciting and innovative private technology companies.

The winners were chosen from thousands of entrants, whittled down to hundreds presenting their companies at the virtual conference on November 17th and 18th. The event, led by Red Herring chairman Alex Vieux, included two days of keynote speeches, discussions, and finalist presentations. Industry experts, insiders, and journalists judged entrants on a wide variety of criteria including financial performance, innovation, business strategy, and market penetration. Winners ran the gamut of verticals, from FinTech and Artificial Intelligence to Security, IoT, and many more industries.

“We believe Axis Security embodies the drive, skill and passion on which tech thrives. The team at Axis should be proud of its achievement – the competition was incredibly strong,” said Red Herring chairman Alex Vieux.

“With our agentless-first approach, the Axis Application Access Cloud is transforming enterprise access for IT teams, employees, and partners alike. Easier to deploy and manage than traditional solutions like VPNs, and far more secure, Axis met an acute need for businesses in 2020. This recognition from Red Herring is great validation for our entire team,” said Dor Knafo, Axis Security co-founder and CEO.

Axis Application Access Cloud

Axis Security’s Application Access Cloud delivers a cloud-native platform that enables enterprises to uniquely deliver secure, tightly managed application access to anyone, anywhere, on any device in minutes. The Axis Security cloud-native platform enforces continuous, adaptive security control at the application layer over access to sensitive corporate resources. Its application isolation technology keeps users separate from the network, and the application, greatly reducing the threat surface and eliminating the possibility of a potentially hostile user from gaining access to other network systems.

Recent Posts

Phishing Attacks on Your Brand are Unrelenting, AI is the Only Way to Fight Back

When it comes to detecting phishing and social engineering threats, slow response times are detrimental. Automate online brand protection to take…

9 hours ago

Germany’s Anti-Semitic Phonetic Alphabet

Interesting development in Germany to restore phonetics that were erased by the Nazis Before the Nazi dictatorship some Jewish names…

13 hours ago

DEF CON 28 Safe Mode Aerospace Village – Allan Tart’s & Fabian Landis’ ‘Low Cost VHF Receiver’

Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's…

21 hours ago

XKCD ‘Contiguous 41 States’

via the comic delivery system monikered Randall Munroe resident at XKCD! Permalink

22 hours ago

DEF CON 28 Safe Mode Aerospace Village – Matt Gaffney’s ‘MITM: The Mystery In The Middle’

Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's…

23 hours ago

IronNet’s top 10 predictions for 2021

It's December, so you know what that means: Predictions for what's to come for cyber in 2021. We brought together…

2 days ago