An Argument for Multi-Layered Security in Wake of the Equifax Breach Winter weather can be brutal. Layers come in handy to protect from the cold, and in security, it's the same story: protection in layers makes for stronger security. Axiomatics can help you implement a layered approach. We're
Earlier this summer, I hosted a live webinar with our partners at EY, where we discussed the Digital Transformation trend and its impact on Digital Identity and Access Management (DIAM). In this webinar, Atul Ojha and Kaushal Patel from EY shared their insights based on many years of experience.
Last week, I was fortunate enough to attend and take part in Consumer Identity World (US) in Seattle, KuppingerCole's first conference this side of the Atlantic. (KuppingerCole is the leading analyst firm in Europe, especially when it comes to Identity & Access Management.) Axiomatics has been
API Gateways effectively manage the authentication of the user and provide service orchestration capabilities, but if sensitive data is involved, additional fine-grained authorization capabilities are required. Digital transformation continues to be a priority as organizations realize the
This month Gartner published their “hype cycles” for 2017. These reports provide a barometer for various technologies within a given market or area of discipline. They represent Gartner’s latest view on the maturity level, adoption rate, and the value of technologies within the particular
Or in short, how CMS security can benefit from ABAC. What is Content Management? Content management (CM), is a set of processes and technologies that supports the collection, managing, and publishing of information in any form or medium. When stored and accessed via computers, this
Opening Night at CIS - Keynote Presentation Cloud Identity Summit took place in Axiomatics Americas backyard this year: downtown Chicago! More than 1,500 individuals – a record-breaking attendance count – shared their perspectives on rapidly evolving trends and best practices around topics
Earlier this month, we officially announced our partnership with SailPoint. In brief, Axiomatics will extend SailPoint’s identity management solutions by adding the richness of Axiomatics’ run time authorization rules to the dynamic policies already managed in the IdentityIQ platform.
Cloud Identity Summit (CIS) is recognized as the world’s premier identity industry conference and includes tracks from industry thought leaders, CIOs, executives and practitioners. CIS, founded by PING Identity, serves as a multi-year roadmap to deploy solutions that are here today and built for
If you missed part 1 or 2 of our GDPR blog series, you can find them here: Part 1: A GDPR Primer: What You Need to Know Part 2: GDPR: A Driver for Digitalization In this post, we will outline a practical approach for achieving GDPR compliance with the help of technology, specifically