- 13 Dec 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Axiad Mesh
- Updated on 13 Dec 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Axiad Mesh is a powerful risk assessment tool that works with your existing security infrastructure to provide a high-level, tailored visualization of your expansive organization.
It’s becoming more and more impossible to track all users across multiple platforms and to see what impact there could be if a user was hacked or impersonated. Axiad Mesh is not another security solution, but rather it empowers you to see what’s happening within all of your security solutions.
What Does Axiad Mesh Do?
Axiad Mesh takes all of the data from the integrated connectors and assesses them for risk. The unique thing that Mesh brings is that it not only looks at the risk level of a single user on a single application, but rather a single user across multiple applications, or multiple users across multiple applications, with different credential types to see how a breach in any of these locations could create massive splash damage.
Even if you are not aware of your users’ sprawl, Mesh can help you correlate identities across your resources by pointing out gaps in your data. This oversight allows you to associate user accounts, credentials, and access levels across various locations to a single identity to easily track them and their activity. If a user is securely protected in one location with a FIDO2 authenticator, for example, but logs in every day to another location with only a password, how secure is that first location if a hacker retrieves the user’s password?
With Mesh, you can see all of these relationships and find out where your security posture is lacking the most.
In addition to providing the data, Axiad Mesh also helps with remediation. Information is helpful, but even more so if you have an idea of the next step.
How Does Axiad Mesh Work?
Mesh admin users can add multiple connectors to provide data to Axiad Mesh. The more data Axiad has, the more correlations and assessments it can make.
Axiad looks at various data points and then creates a risk score for users, connectors, locations, groups, etc. that then bubble up into overall risk scores that highlight the least and most secure aspects of your environment.
The Risk Score is 1 - 100, with 1 being the least risky and 100 being the most. This risk score is made up of risks around the specific data point (i.e. a user) and also includes potential risk based on their level of access to this or another application, the blast radius of another application or user, the authentication devices used, etc.
With all of that information, you can view high level information or drill down into detail to see where the risks originate and even delegate remediation.
Axiad Delegation
We don’t want you to have to figure everything out on your own. As an industry leader, Axiad provides insight into the risk that we see and also helps you to resolve it to decrease the risk score.
Does Axiad Mesh Require Axiad Conductor?
Though you can use both Axiad products to enhance your security posture, they are independent products and are not reliant on each other to work.
Axiad Mesh prerequisites do include:
An Identity Provider (IdP) for secure login into the web application
At least one connector to provide data to Axiad Mesh
Learn more
Check out the Axiad Mesh Admin Guide and User Guide to understand more about how this product works.