HPE buys Israeli co. Axio Security to expand its edge-to-cloud security capabilities


Hewlett Packard Enterprise (HPE) announced its acquisition of Israeli company Axio Security. This acquisition will help HPE expand its offerings in the field of security analytics and will help to accelerate the growth of its Aruba Edge Services Platform.

Axio Security, founded in 2013, is a cybersecurity company that provides an analytics-based platform for incident response, risk management, and compliance. The company’s platform is used by organizations to identify and mitigate cyber risks, respond to cyber incidents, and comply with regulations.

HPE plans to integrate Axio Security’s platform into its Aruba Edge Services Platform, which provides secure connectivity and network services to enterprise customers. The integration will enable HPE to offer its customers an end-to-end security solution that includes advanced analytics, risk management, and compliance capabilities.

“As we transition from a post-pandemic world, and a hybrid work environment has become the new normal, a new approach is needed for network edge security to protect critical SaaS applications,” said Phil Mottram, executive vice president and general manager, HPE Aruba Networking.

“The convergence of Aruba and Axis Security solutions will transform edge-to-cloud connectivity with a comprehensive SASE solution that provides enterprises with the highest levels of security for both IoT devices and all users’ access across geographically distributed locations.

This acquisition is the latest in a series of moves by HPE to strengthen its security offerings. In 2021, HPE acquired Silver Peak, a software-defined wide-area network (SD-WAN) company, and Scytale, a cloud-native security company.

Overall, the acquisition of Axio Security by HPE highlights the growing importance of cybersecurity in today’s digital landscape. With the integration of Axio Security’s platform into its offerings, HPE will be better positioned to help its customers identify and mitigate cyber risks, respond to cyber incidents, and comply with regulations.

Related Stories