This is the generic account for Axiomatics blog. You can expect posts that are published by this user to be easily digestible and for the most part business related.

Top Five Trends to Transform Enterprise Security in 2017

Our experts at Axiomatics got together at the end of the year to take a look at the trends in store for 2017. Some of these may sound familiar, as the era of digital transformation continues to expand. But you'll find a common theme: Marty Leamy, our Americas President said it best, “This year’s trends examine the evolving ways organizations can realize better enterprise-wide security with the exploding amounts of data that enterprises need to protect. Business executives are demanding better enterprise-wide security for all of their data, not only for regulatory compliance but also to protect their most critical assets.”

Attribute Based Access Control can help you address these areas that will challenge access control across your enterprise. Read on for the Top Five! 

Continue reading
398 Hits
0 Comments

Customer Identity, Contextual Security, and More: What We Learned at Gartner’s 2016 IAM Conference

Customer Identity, Contextual Security, and More: What We Learned at Gartner’s 2016 IAM Conference

This year’s Gartner IAM Conference was full of thoughtful keynotes and a reflection of things to come for IT professionals in 2017. Over 1500 professionals concerned with keeping customer and proprietary data more secure attended the conference last week, which took place in Las Vegas, Nevada, one of the riskier cities in the United States (if you like blackjack, that is).

Richard Holland of Eli Lilly had an opportunity to share how they’ve used various capabilities in their IAM ecosystem to drive the development of new medicines. He shared the impact of implementing ABAC in his talk, "Bringing IAM and ABAC from Strategy to Production, with the Business, in Medicines Development” and gave context to how ABAC works within the IAM ecosystem. He was one of many great speakers in the summit's expert lineup.

What’s Next in IAM?

There were many interesting conversations happening last week. Below are three crucial topics we heard discussed at length across the conference floor, that we believe are the most pressing for IAM and IT executives in 2017.

Continue reading
638 Hits
0 Comments

Gartner's IAM Summit: A Beginner's Guide to Digital Transformation

Gartner's IAM Summit: A Beginner's Guide to Digital Transformation

transformation blog 

Axiomatics is heading to Gartner’s annual Identity and Access Management (IAM) Summit on November 29 at Caesar's Palace in Las Vegas. By the time the event concludes on December 1st, the 1600-plus attendees will have a better understanding of the most pressing security issues facing digital leaders today. We know governance, processes and controls, and the cloud will be top of mind for most attendees, however, a number of new topics are beginning to emerge organically in the security space. The most prevalent and impactful of these is Digital Transformation.

If you’re new to the concept of IAM, or just want to be able to hold your own at cocktail hours, we’ve written an overview of the Foundations of IAM.

Tags:
Continue reading
1019 Hits
0 Comments

The Benefits of Fine-Grained Dynamic Authorization: An introduction to Attribute Based Access Control

One of the great benefits of Attribute Based Access Control (ABAC) is that it can be as coarse or fine-grained as you need it to be. You start with two attributes: role and data, and you have Role Based Access Control (RBAC). But from there, it gets much more interesting, as you can add as few or as many attributes as necessary to your authorization policy in order to control who can access what. Attributes such as time of day, location of user, device being used, etc. The context of each attribute is then taken into consideration at the time of request before access is granted or denied.

Continue reading
692 Hits
0 Comments

100% Pure XACML

100% Pure XACML

X may mark the spot if you’re looking for treasure, but if you’re looking to protect something dear to you, such as your sensitive assets, X can also form part of your security program. That’s because X is the first letter in XACML, the OASIS standard language that authorization solutions from Axiomatics are based on. eXtensible Access Control Markup Language (XACML) offers a standardized way to achieve externalized and dynamic authorization. This means that authorization decisions are made by an authorization service at run-time, based on policies which determine what actions a user or service can perform on a given information asset and in a specific context.

Continue reading
1080 Hits
0 Comments

Dynamic Authorization: The Natural Evolution of Access Control

Dynamic Authorization: The Natural Evolution of Access Control

Access Control has been around ever since there has been the need to protect valuable assets. Sentries were posted and moats were built. Still, history is littered with access breaches, many of which, such as the Trojan horse, have gone down in folklore.

Continue reading
1555 Hits
0 Comments

Attribute Based Access Control Beyond Roles

Attribute Based Access Control Beyond Roles

Over the past 20 years the IT road map has changed beyond recognition. Cloud computing, smartphones and online services are part of our daily routines. Until now however, access control has been predominantly managed with a static, antiquated model, namely RBAC. The time has now come to look beyond this, and use a dynamic, intelligent model. It's time for ABAC.

Continue reading
1402 Hits
0 Comments

Solving the Manufacturing Data Protection Triangle

Solving the Manufacturing Data Protection Triangle

How ABAC Can Help Protect IP and Speed Time-To-Market.

Manufacturers face unique challenges when it comes to data protection. With digital transformation upon them, many manufacturers are literally awash with terabytes of data that needs storing, mining - and equally important - safeguarding. 

Attribute Based Access Control presents an opportunity to help these enterprises manage how access to this data is authorized - and introduces control, visibility and compliance management as tangible benefits. Read about the “Data Protection Triangle” and how ABAC can help reduce the mystery of how to solve it.

Continue reading
1355 Hits
0 Comments

Cloud Identity Summit 2016

The 2016 Cloud Identity Summit is fast approaching and we’re a sponsor of the show this year. As a long-term partner of Ping Identity, we’ve witnessed Identity and Access Management become a dominant area within information security. We’re happy to see this year’s event focuses on the R/evolution of Enterprise Security, not only because we are the “#1” provider of disruptive dynamic fine-grained authorization, but also because we published a paper on this topic some time ago.

Continue reading
976 Hits
0 Comments

5 Burning Issues in the Financial Services Industry and How ABAC Can Help

In this blog post we will present 5 burning issues within the financial services industry and how Attribute-Based Access Control can help tackle some of the access control challenges faced in the financial services industry.
 

Continue reading
1474 Hits
0 Comments