Earlier this week, we announced our partnership with Saviynt, a leading provider of identity governance and cloud security solutions. The partnership allows for the Axiomatics Dynamic Authorization suite to integrate with Saviynt’s Identity Governance and Administration (IGA) solutions. This
What key roles defense in depth and layered security will play in the digital age Defense in depth and layered security feel like terms from a much simpler era in information security. It was not too long ago when these concepts seemed more applicable during the dawn of the Internet age. At that
Authorization of user access to data and applications is more important than ever - and enterprises are looking to solve this in the best way possible. That includes weighing a "Do It Yourself" in-house scenario vs. outsourcing to a qualified vendor. When making a Build vs Buy decision for IAM
After more than a decade as a consultant, and then CTO of a mobile payment company, Erika Boije discusses what drew her to Axiomatics and how she sees dynamic authorization shaping the future of access control. She specializes in agile working, architecture, system integrations, especially
How to effectively manage IAM controls to secure critical assets In previous posts I have discussed in depth the importance of authorization, specifically dynamic authorization, to control access to critical information assets. However, authorization is only a portion of the access control
We’ve been hearing from our customers about evolving use cases around data-centric security, and the need to closely manage access to data sets – across relational databases and Big Data stores. Our approach to data filtering fuels data-centric security and enables visibility and control by
When thinking about important business assets you probably think of tangible items like property, vehicles, computers, etc., but for many organizations, it’s the intangible digital assets that are a top priority. Having a clear data strategy is absolutely critical to business success because data
Over the past year, you’ve no doubt been bombarded with news and opinions on the GDPR. “Who will be affected?” “Are you prepared?” “Will the deadline be extended?” “How are we going to find a Data Protection Officer in time?” “What even is a Data Protection Officer?”
In this post, we take a look at what security and dev teams should both do, and not do, to create a security-friendly environment. Security is the responsibility of all of us. Given the visibility and public disclosure that results from cyberattack breaches, cybersecurity and enterprise readiness
Axiomatics’ solutions implement Attribute Based Access Control (ABAC). This means that, when processing an access control request, digital rules can be evaluated to consider the attributes of the requestor, the attributes of the requested resource, and the attributes of the environment. This