Gerry is the manager of Axiomatics’ US operations, supporting the sales and marketing teams as well as working with partners. During his career, he has worked in financial services, as an industry analyst and with Axiomatics since early 2010. In 2007, Gerry organized the first ever XACML interoperability demonstration at the Burton Group Catalyst Conference.

How Big Data is Driving Evolution in Identity and Access Management

big Data Gartner2 blogpage

What is Big Data and Why You Should Care

In a previous post, I discussed some of the security challenges awaiting companies looking to leverage the explosion of Big Data. The term itself - “Big Data” - is sort of vague. What do we mean when we say Big Data? Is it the size of the data files? The number of files?

Continue reading
1045 Hits
0 Comments

The Big Data Security Challenge

Big data is one of the “big” industry trends that is challenging enterprises these days, especially from a data security perspective. Thanks to the explosion of Big Data, the Internet of Things (IoT), and global mobilization, the way companies use, collect, store and process data has changed forever. If we look back to 2011, IT analysts IDC published the “Extracting Value from Chaos” report[1], in which they announced, “While 75% of the information in the digital universe is generated by individuals, enterprises have some liability for 80% of information in the digital universe at some point in its digital life.”

Continue reading
1020 Hits
0 Comments

Can Dynamic Authorization Help Resolve Manufacturers’ Security Concerns About IoT?

Can Dynamic Authorization Help Resolve Manufacturers’ Security Concerns About IoT?

The Internet of Things (IoT) has revolutionized business intelligence within manufacturing. The availability of product data means companies no longer need to rely on customers to provide them with their usage behavior or product performance data. If a product is connected, a manufacturer “simply” has to monitor the data that comes in via the connected channels, and process the information received.

Continue reading
1064 Hits
0 Comments

Compliance in the Financial Sector: Driving Transformational Change From the Inside Out

It’s no secret that dealing with compliance is becoming more complex and costly. In 2013, Thomas Reuters reported that there were 110 new regulatory announcements every day. They didn’t report how many of these involve the financial sector, but from conversations with our customers, we know many of them have a direct impact on global financial institutions.

Continue reading
1216 Hits
0 Comments

Trends to watch in 2016

We’re well into the start of 2016, so we better get our observations about trends to watch out there before it’s too late! There are many industry developments to observe as the pace of innovation continues to accelerate. Here are just a handful of trends that we’ll be watching as they develop throughout 2016: Identity management, access control and security issues for these topics will vary across industry segments and geographic regions, but will be a crucial aspect of any successful endeavors.

Continue reading
1499 Hits
0 Comments

The Physics of Coarse- and Fine-grained Authorization

In his recent blog, Homan Farahmand of Gartner discussed the differences between coarse-grained and fine-grained authorization, likening them to the study of classical and quantum physics. As somebody who has been working with fine-grained authorization for the past ten years, I can relate to this comparison but from a slightly different angle. Back in the 1990s (and before), coarse-grained authorization models, such as RBAC (Role-based Access Control), were the chosen (or should I say classic) method of managing access control at large enterprises and government agencies. Fine-grained authorization models, such as ABAC (Attribute Based Access Control) were a quantum leap away. There were a few mavericks out there practicing it, but these solutions were mainly developed in-house.

Continue reading
1328 Hits
0 Comments

CA World 2015

A quick hello from CA World 2015!

Axiomatics is a sponsor again this year and we're holding up after a very busy day one. 

Continue reading
947 Hits
0 Comments

Beyond RBAC and towards ABAC – More Tales from Down Under

Welcome back! Here is Part 2 of the Axiomatics road trip to Australia and New Zealand. As mentioned in Part 1, the trip was loaded with interesting conversations and here are five more topics that warranted some additional commentary:

Continue reading
3416 Hits
0 Comments

Beyond RBAC and towards ABAC – Tales from Down Under

My colleague, David Brossard and I recently completed a two-week road trip to Australia and New Zealand where we toured with our local partner, First Point Global. The trip began with the local Gartner Risk and Security Summit followed by several customer meetings and workshops across the region. In a couple of blog posts, I will share a number of interesting topics that arose during our discussions of attribute based access control (ABAC).  It’s always invigorating to hear how people react to the way we at Axiomatics describe ABAC business benefits, integration strategies, or updates about industry standards. There is always a new angle to understand, a different view of the business problem, or the realisation that an issue discussed years ago remains unsolved for some.

In the following sections, I will explore the topics that, I think, warranted additional comment. I invite you to add comments and share your own thoughts. Be on the lookout for the second and final instalment in the very near future.

Continue reading
3852 Hits
0 Comments

XACML vs. Drools: A Comparison

Enterprises have several options when considering how to address the authorization function for in-house developed applications. In this post, we will compare and contrast the differences between Drools, a business process rules language, and Extensible Access Control Markup Language (XACML), an industry standard for authorization.

Continue reading
4991 Hits
0 Comments