AXSionics AG – The Internet Passport Company
AXSionics AG provides a global IT security infrastructure solution, that allows companies and individuals, independently of each other, to authenticate identities and verify internet based transactions - in a very simple, elegant and economical manner.
The solution is visible to its users through a single, really “smart” card – the AXSionics Internet PassportTM – integrating multiple innovative security technologies including biometrics. It protects the user’s privacy, since all biometric data remains exclusively on the Internet Passport and therefore under the users’ control.
AXSionics was founded in 2003 as a Spin-off from the Berne University of Applied Sciences in Biel/Bienne and uses patented and award winning technologies.
AXSionics operates globally and has sales partnership with leading companies. After raising 10 M CHF in mid-2008, the company counts more than 30 employees today and continues to grow.
AXSionics is member of the “European Network of Excellence FIDIS”, and is winner of Swiss Technology Award 2007 as well as the Swiss ICT Award 2008.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
The proverbial Computing Troika that KuppingerCole has been writing about for years does not show any signs of slowing down. The technological trio of Cloud, Mobile and Social computing, as well as their younger cousin, the Internet of Things, have profoundly changed the way our society works. [...]
Traditional tools are still widely deployed by many organizations and in certain scenarios serve as a useful part of enterprise security infrastructures, but recent trends in the IT industry have largely made them obsolete. Continued deperimeterization of corporate networks because of adoption of cloud and mobile services, as well as emergence of many new legitimate communication channels with external partners has made the task of protecting sensitive corporate information more and more difficult. The focus of information security has gradually shifted from perimeter protection towards [...]