Gartner has an interesting article titled "Modernize Your Runtime Authorization" that highlights some aspects you need from a modern enterprise authorization systems. Over the years I have seen several adjectives being used to describe an advanced authorization management system. These capture
Global regulatory legislation is a headache for almost every business, especially large,multi-national corporations. Organizations operating across borders must manage diverse regulations specific to each country. Today, we see an evolution of data privacy-specific laws to formalize, unify and
As new technologies emerge and hackers continue to develop new techniques, your enterprise data becomes more vulnerable each day. The days of storing information in a single, on-premise database are over. As a result, businesses are searching for new, modern technologies and techniques to secure
In case you missed our press release on the Critical Data Security Trends for 2019, we're sharing the list here on the blog for the ease of our readers. What's on your priority list? We'd love to hear your feedback. More Data, More Devices and More Regulations Mean New Approaches to Data Security
We’re getting ready to head off to las Vegas, where, we’ll be joining our partners and customers at Gartner’s annual Identity and Access Management Summit. This event has grown substantially over the last several years, and we’re looking forward to talking with an expanding field of IAM
Axiomatics’ Vice President of Business Development, Gerry Gebel, was interviewed by Cynthia Artin on the intersection of Federated Identity Management with Dynamic Authorization. The virtualization of nearly everything digital is pushing more and more applications, services, storage, and compute
Is your business preparing to move to the cloud? Or have you already adopted the cloud and are looking for ways to enhance cloud security and protect your company resources? As organizations trend towards cloud environments, new challenges and opportunities arise. A significant challenge is how to
The promise of secure DevOps can be realized through security technologies such as dynamic authorization Fundamentally, DevOps is all about speed and agility. Customers expect companies to deliver and update applications at an accelerated pace and businesses must adopt modern technologies to meet
We recently announced our partnership with MuleSoft and the new integration with their Anypoint Platform™. Axiomatics now augments existing access control with a customizable API access control policy. Combining MuleSoft’s API management solutions with Axiomatics’ Attribute Based Access
Given the popularity of APIs and microservice-based application development, it is no surprise that API security is also a topic of great interest. Many events centered around API security are emerging, and API World is one such conference that caught my interest. This year, API World invited