Tech Archives - Axiomatics
Axiomatics
  • Dynamic Authorization Suite
    • Applications
    • SmartGuard® for Data
    • Databases
    • APIs and Microservices
      • Amazon API Gateway Integration
      • Apigee Integration
      • Axway API Integration
      • CA API Gateway Integration
      • IBM DataPower Gateway Integration
      • Kong Community Integration
      • MuleSoft Integration
      • Oracle API Gateway Integration
    • IAM Ecosystem Integrations
    • Reporting & Governance
    • Expert Services
  • Developers Zone
  • Resources
    • About Us
    • Analyst Reports
    • Case Studies
    • Data Sheets
    • Industry Briefs
    • Infographics
    • Product Sheets
    • Tutorials
    • Use Cases
    • Webinars
    • White Papers
  • Solutions
    • Challenges
    • Industries
    • Roles
  • Axiomatics Federal, Inc.
  • Blog
  • About Us
    • The Company
    • Working at Axiomatics
    • Press Room
    • Events
    • Partners
    • Management
    • Corporate Social Responsibility
    • Contact Us

Tech

Home / Tech
ZTNA_blog
Tech Wednesday, 01 April 2020Monday, 27 April 2020 by Axiomatics

Zero Trust Network Access Eliminates Wide Network Access Perimeters 

Network access security is quickly evolving as the amount of data produced by an organization increases. Combine this with the rapid increase of remote working around the world and employees needing that secure data quickly to stay productive. Traditionally, network security was about protecting
XACML
Tech Monday, 21 October 2019Wednesday, 01 April 2020 by Axiomatics

Stack Overflow: What’s the difference between policy target and rule target in XACML?

Are you looking for further clarification in working with XACML? This post originally appeared on Stack Overflow. Question: XACML allows us to specify <Target> tag in both <Policy> as well as in <Rule> tags. What I would like to understand is that: What is the
Tech Monday, 30 September 2019Friday, 27 September 2019 by David Brossard

Protect What Matters Most: The Data — Part 2

Protect What Matters Most: The Data -- Part 2, Data-Centric Security Welcome to Part 2, of Protect What Matters Most: The Data. You can find Part 1 here, if you didn't catch it. A while back, my colleague, Gerry Gebel, and I delivered a webinar on the very topic of data-centric authorization.
Tech Monday, 23 September 2019Wednesday, 20 November 2019 by David Brossard

Protect What Matters Most – The Data

Protect What Matters Most: Fine-grained, Policy-based Authorization for your Data Introduction When I speak to customers about what Axiomatics does (fine-grained, externalized, policy-based access control), I tell them that historically access control was implemented within each and every app or
Tech Tuesday, 10 September 2019Thursday, 19 September 2019 by Jonas Iggbom

The Power of Dynamic Data Masking and Dynamic Authorization

Most modern environments today handle large amounts of data. Typically the data is spread across different data sources such as relational databases or even a big data system or data lake. And within these massive data stores, therein lies data that is very sensitive and critical to
Tech Tuesday, 16 July 2019Tuesday, 16 July 2019 by Axiomatics

Stack Exchange: Looking for an Approach to Implement Attribute Based Access Control (ABAC)

This Q+A originally appeared on Information Security Stack Exchange.  Question: We are looking to implement Attribute-Based Access Control. While we are sold on the philosophy, there are two topics that seem to crop up: Will it lead to significant performance issues? Especially
Tech Friday, 05 July 2019Tuesday, 07 April 2020 by Axiomatics

Stack Overflow: MERN Stack Authorization and Authentication

Are you working with MERN (Mongo, Express, React-redux, Node) and Authorization? This Stack Overflow post details the question at hand, and then how to use dynamic authorization with MERN. It originally appeared on Stack Overflow. Question I am creating a MERN (Mongo, Express, React-redux, Node)
Gluu Axiomatics UMA
Tech Tuesday, 18 June 2019Friday, 05 July 2019 by Axiomatics

Authorize Like a Pro with Axiomatics + UMA – Guest Blog Post from Gluu

Today's blog post is a post from one of our partners, Gluu. The feature writer is Mike Schwartz. He has been an entrepreneur and identity specialist for more than two decades. He is the technical and business visionary behind Gluu. Mike is an application security expert and has been a
APS Cloud
Access Control 101 Monday, 03 June 2019Monday, 13 July 2020 by Andres Martinelli

Axiomatics Policy Server Evolves with the Cloud

Axiomatics Policy Server keeps evolving to meet the needs of our customers as they migrate resources to the cloud. Our latest update to the cloud-native Policy Decision Point (PDP) makes it compliant with the REST and JSON profiles version 1.1 of the XACML 3.0 standard (version 1.1 was published
Access Control 101 Wednesday, 24 April 2019Wednesday, 24 April 2019 by Axiomatics

Stack Overflow: Creating a consistent authorization framework

How to solve the consistency problem of managing authorization of Single Page Application & .NET Core WebAPI? Question from Stack Overflow User Ishan Akin. We are currently developing a web application that has following architecture. A single page application based on
12345...Last PageNext

Subscribe to the blog

  • Authors
  • Categories
  • Tags
Srijith NairSrijith Nair
AxiomaticsAxiomatics
Pablo GiambiagiPablo Giambiagi
David BrossardDavid Brossard
Jonas IggbomJonas Iggbom
Andres MartinelliAndres Martinelli
Gerry GebelGerry Gebel
Kelly SheltonKelly Shelton
Mike GoodMike Good
Niklas JakobssonNiklas Jakobsson
Brian ColalucaBrian Colaluca
Craig GilleyCraig Gilley
Jonas MarkströmJonas Markström
Jeffrey KleinJeffrey Klein
See More Authors
  • Business Tech Question of the Week Access Control Access Control 101 Architecture API Axiomatics Data Access Filter XACML The Company ABAC Health Insurance Safe Harbor Cross-Border Privacy API
  • Whats New What's New RBAC events Dynamic Authorization data security Data Centric Security Cloud Authorization Attribute Based Access Control API Access Control ABAC101 ABAC 101 ABAC

Featured Posts

  • Enterprise-Authorization-System Business Friday, 15 January 2021Monday, 18 January 2021 by Srijith NairModern Enterprise Authorization Management SystemGartner has an interesting article titled Read more...
  • Mastering GDPR and CCPA Compliance with Dynamic Authorization Business Tuesday, 03 November 2020Monday, 18 January 2021 by AxiomaticsMastering GDPR and CCPA Compliance with Dynamic AuthorizationGlobal regulatory legislation is a headache for Read more...

Still have questions?

Send us an email at webinfo@axiomatics.com
Request a Demo

Axiomatics

  • Supplier Code of Conduct
  • Cookie Notice
  • Privacy Policy
  • Working at Axiomatics
  • It’s easy to contact Axiomatics!
  • Get Support
Copyright © 2013 - 2021 Axiomatics. All rights reserved.