Introduction Tableau offers Business Intelligence (BI) software that is great for generating meaningful graphs and visualizations of data. The software can query many different sources for data and aggregate these into illustrations that tell the story behind the data. When using BI tools,
When it comes to securing access to services and data, we see many different use cases and, with that, the enforcement of authorization rules at different layers in the IT stack. This spans all the way from the Web/Presentation tier down to the data tier as illustrated in Figure 1. Enforcing
Splunk is a Security Information and Event Management (SIEM) tool that can be used to aggregate and analyze security logs. Axiomatics Policy Server (APS) can be configured to generate audit logs that monitor who logs in to the Axiomatics Services Manager (ASM) and who does what within the ASM.
Part 1: How to Containerize Containerization is a trend we’ve seen at the enterprise level and among the federal government for some time now. If the term is new to you, here is a simple metaphor that explains why organizations are shifting towards this IT practice: Imagine the struggle of
We’ve been hearing a lot from our customers lately about the power of using APIs and microservices to expand business and speed time-to-market for new offerings. These new projects are almost always built using many different components and with that have complex security requirements – the
Background Attribute Based Access Control (ABAC) leverages attributes in combination with a set of policies to determine authorization decisions. A request is sent from an application, API gateway, or something else that acts as a Policy Enforcement Point (PEP). The Policy Decision Point (PDP)