Most modern environments today handle large amounts of data. Typically the data is spread across different data sources such as relational databases or even a big data system or data lake. And within these massive data stores, therein lies data that is very sensitive and critical to
Introduction Extending the authorization capabilities of an API Gateway to use fine-grained dynamic authorization with the Axiomatics Policy Server is a common use case. There are several different aspects of authorization that are typically applied to API’s: Authorizing whether or not
Dynamic Authorization and DevOps work well together. I'll give a quick overview of the process and then share a few things specific to Axiomatics dynamic authorization and the move to DevSecOps. DevOps defines the process between development and IT for efficient collaboration to build, test and
We recently announced our partnership with MuleSoft and the new integration with their Anypoint Platform™. Axiomatics now augments existing access control with a customizable API access control policy. Combining MuleSoft’s API management solutions with Axiomatics’ Attribute Based Access
Across industries, businesses are focusing more on their IT departments and developing more applications than ever before. If your team needs to deliver a microservice, a new API, or share data with your customers through a mobile app, there are many different things that you want to develop in
Introduction Tableau offers Business Intelligence (BI) software that is great for generating meaningful graphs and visualizations of data. The software can query many different sources for data and aggregate these into illustrations that tell the story behind the data. When using BI tools,
When it comes to securing access to services and data, we see many different use cases and, with that, the enforcement of authorization rules at different layers in the IT stack. This spans all the way from the Web/Presentation tier down to the data tier as illustrated in Figure 1. Enforcing
Splunk is a Security Information and Event Management (SIEM) tool that can be used to aggregate and analyze security logs. Axiomatics Policy Server (APS) can be configured to generate audit logs that monitor who logs in to the Axiomatics Services Manager (ASM) and who does what within the ASM.
Part 1: How to Containerize Containerization is a trend we’ve seen at the enterprise level and among the federal government for some time now. If the term is new to you, here is a simple metaphor that explains why organizations are shifting towards this IT practice: Imagine the struggle of
We’ve been hearing a lot from our customers lately about the power of using APIs and microservices to expand business and speed time-to-market for new offerings. These new projects are almost always built using many different components and with that have complex security requirements – the