Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Okta makes AI identity play with Axiom acquisition | Computer Weekly

By Computer Weekly by By Computer Weekly
August 26, 2025
Home Uncategorized
Share on FacebookShare on Twitter


Identity technology supplier Okta is to acquire Axiom Security, a supplier of privileged access management (PAM) for cloud, database, software-as-a-service (SaaS) and other critical resources, to reinforce its own offerings in this area.

The acquisition will see Axiom’s core technology integrated into Okta Privileged Access, which the buyer says will expand access controls across more sensitive resources so that its customers can, in turn, strengthen their own security fabric.

Okta claimed privileged access controls will form a key defensive layer to mitigate risks related to artificial intelligence (AI) as more of its customers bring AI projects into their workflows.

The supplier believes that many organisations are not giving sufficient regard to these risks. Its recent AI at work survey – which quizzed almost 300 C-suite executives in nine countries, including the UK – found that only 10% of respondents had a “well-developed” strategy for managing so-called non-human identities, or NHIs.

“In today’s dynamic cloud environment, manually managing these permissions can quickly become chaotic, leading to significant security risks, compliance gaps and operational inefficiencies,” observed Okta’s chief technology officer (CTO) and head of engineering, Abhi Sawant.

“With the introduction of a common NHI – AI agents – into the enterprise, businesses are struggling to ensure there is still visibility, security and governance for these unique privileged account types.

“Outdated or traditional PAM platforms that aren’t built with the flexibility and neutrality needed to manage permissions for the non-human workforce will lead to greater security risks,” he added.

According to Sawant, this is just one among many reasons that enterprises should consider deploying identity security fabrics – that is to say, architectures that can appropriately manage newfangled NHIs, as well as more traditional flesh-and-blood ones.

New functionality

In the coming months, Okta plans to introduce multiple Axiom-derived functionalities into its Privileged Access service.

These will include unified controls to offer a single-point-of-admin for privileged access across all privileged resources, whether on-premise or cloud-based, and just-in-time access, a potentially critical capability that eliminates standing privileges and replaces them with time-limited access, reducing operational overhead and risks by automating permissions for elevated access in environments such as Amazon EKS, GitHub, PostgreSQL or Snowflake, to name but a few.

At the same time, Okta hopes to spin up AI-based application connector builder capabilities, exploiting AI to provide more security coverage across environments, while also using Axiom to extend secure access capabilities to databases and Kubernetes.

Securing agents a hot topic

Another product of Israel’s booming security development ecosystem, Axiom was co-founded four years ago by Itay Mesika and Ilan Dardik, who, like many cyber entrepreneurs, met during their military service. The firm has attracted around $10m in funding in the past couple of years, including a $7m seed round in 2022.

Still operating very much in its scaleup phase, Axiom counts multiple software companies among its customers, including corporate travel management platform Navan, and some cyber security names, including cloud security specialists Orca Security and Varonis.

The financial terms of the acquisition were not disclosed, but according to Israeli media reports, the deal may value Axiom somewhere around $75m (£56m).

The deal comes hot on the heels of Palo Alto Networks’ far larger bid for CyberArk, which similarly focused on incorporating more identity and PAM expertise into the buyer’s security platform with the intent of better protecting autonomous AI agents.



Source link

By Computer Weekly

By Computer Weekly

Next Post
Three new Citrix NetScaler zero-days under active exploitation | Computer Weekly

Three new Citrix NetScaler zero-days under active exploitation | Computer Weekly

Recommended.

How does the U.S. stock market typically react to a government shutdown?

How does the U.S. stock market typically react to a government shutdown?

September 26, 2025
Tech Trends 2026 Report Released: Eight Emerging Trends Redefining the Future of IT, According to Findings by Info-Tech Research Group

Tech Trends 2026 Report Released: Eight Emerging Trends Redefining the Future of IT, According to Findings by Info-Tech Research Group

October 7, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio