Tech Archives - Page 6 of 14 - Axiomatics
Axiomatics
  • Dynamic Authorization Suite
    • Applications
    • SmartGuard® for Data
    • Databases
    • APIs and Microservices
      • Amazon API Gateway Integration
      • Apigee Integration
      • Axway API Integration
      • CA API Gateway Integration
      • IBM DataPower Gateway Integration
      • Kong Community Integration
      • MuleSoft Integration
      • Oracle API Gateway Integration
    • IAM Ecosystem Integrations
    • Reporting & Governance
    • Expert Services
  • Developers Zone
  • Resources
    • About Us
    • Analyst Reports
    • Case Studies
    • Data Sheets
    • Industry Briefs
    • Infographics
    • Product Sheets
    • Tutorials
    • Use Cases
    • Webinars
    • White Papers
  • Solutions
    • Challenges
    • Industries
    • Roles
  • Axiomatics Federal, Inc.
  • Blog
  • About Us
    • The Company
    • Working at Axiomatics
    • Press Room
    • Events
    • Partners
    • Management
    • Corporate Social Responsibility
    • Contact Us

Tech

Home / Tech / Page 6
Tech Thursday, 08 June 2017Wednesday, 20 September 2017 by Jonas Iggbom

Leveraging Splunk to Aggregate Axiomatics Policy Server Log Data

Splunk is a Security Information and Event Management (SIEM) tool that can be used to aggregate and analyze security logs. Axiomatics Policy Server (APS) can be configured to generate audit logs that monitor who logs in to the Axiomatics Services Manager (ASM) and who does what within the ASM.
Tech Wednesday, 07 June 2017Wednesday, 20 September 2017 by Axiomatics

Dynamic Authorization: Separating the Fact from the Fiction

While it is predicted that “by 2020, 70% of enterprises will use Attribute-Based Access Control (ABAC) to protect critical assets” (Gartner), a lot of confusion still lingers around what exactly an organization can expect to get out of ABAC, or Dynamic Authorization. A quick
Business Wednesday, 31 May 2017Monday, 30 April 2018 by Måns Håkansson

How Dynamic Authorization Can Support GDPR Compliance

If you missed part 1 or 2 of our GDPR blog series, you can find them here: Part 1: A GDPR Primer: What You Need to Know Part 2: GDPR: A Driver for Digitalization In this post, we will outline a practical approach for achieving GDPR compliance with the help of technology, specifically
Question of the Week Wednesday, 26 April 2017Wednesday, 20 September 2017 by Angelo Stroppa

How Can I Use Time in a XACML Policy?

Attribute-based access control (ABAC) lets us define fine-grained authorization policies that typically take into account user attributes and resource attributes. Sometimes we may need time to express authorization constraints. For example: Only a supervisor can view the medical record of a
ABAC Thursday, 20 April 2017Tuesday, 16 October 2018 by Brian Colaluca

Federal Mission: Dissemination and Information Sharing using ABAC

This Use Case, Federal Mission: Dissemination and Information Sharing using Attribute Based Access Control (ABAC), discusses how an ABAC model can be used to disseminate information between agencies widely and securely.  By using a fine-grained, ABAC implementation such as Axiomatics Policy Server
Axiomatics Policy Server Wednesday, 19 April 2017Wednesday, 20 September 2017 by Matt Carter

Running Axiomatics Policy Server in the Cloud, Part 2: Amazon Web Services

Part 1 of this blog series can be found here: Axiomatics Policy Server in the Cloud: How to Containerize  Axiomatics recently announced a public Amazon Machine Image (AMI) available through the AWS Marketplace. This AMI contains a one-click configuration of the Axiomatics Policy Server (APS),
Axiomatics Policy Server Tuesday, 28 March 2017Thursday, 20 April 2017 by Jonas Iggbom

Running Axiomatics Policy Server in the Cloud

Part 1: How to Containerize Containerization is a trend we’ve seen at the enterprise level and among the federal government for some time now. If the term is new to you, here is a simple metaphor that explains why organizations are shifting towards this IT practice: Imagine the struggle of
API Wednesday, 01 March 2017Thursday, 20 April 2017 by Matt Carter

The Convergence of Personalization and Authorization

A founder of a former company said something to me as we closed the doors, “I wish I built a tiered subscription model at the start.” He went on to describe how many companies give up too much capability with their initial release, then when it becomes popular, they can’t grow or easily
API Thursday, 09 February 2017Wednesday, 20 September 2017 by Jonas Iggbom

The Power of ABAC for your API Gateway

We’ve been hearing a lot from our customers lately about the power of using APIs and microservices to expand business and speed time-to-market for new offerings. These new projects are almost always built using many different components and with that have complex security requirements – the
API Tuesday, 10 January 2017Thursday, 02 August 2018 by David Brossard

How Using ABAC Can Improve API Security in 2017

During Gartner’s recent IAM conference, I noticed an emerging conversation around the issues of API usage at the enterprise level. Enterprise adoption of APIs is viewed as an inevitable consequence of the ongoing digital transformation many IT professionals are managing. API stands for
PreviousFirst Page...45678...Last PageNext

Subscribe to the blog

  • Authors
  • Categories
  • Tags
Srijith NairSrijith Nair
AxiomaticsAxiomatics
Pablo GiambiagiPablo Giambiagi
David BrossardDavid Brossard
Jonas IggbomJonas Iggbom
Andres MartinelliAndres Martinelli
Gerry GebelGerry Gebel
Kelly SheltonKelly Shelton
Mike GoodMike Good
Niklas JakobssonNiklas Jakobsson
Brian ColalucaBrian Colaluca
Craig GilleyCraig Gilley
Jonas MarkströmJonas Markström
Jeffrey KleinJeffrey Klein
See More Authors
  • Business Tech Question of the Week Access Control Access Control 101 Architecture API Axiomatics Data Access Filter XACML The Company ABAC Health Insurance Safe Harbor Cross-Border Privacy API
  • Whats New What's New federal government events Dynamic Authorization data security Data Centric Security Cloud Authorization Attribute Based Access Control API Access Control ABAC101 ABAC 101 ABAC

Featured Posts

  • How OAuth is related to Attribute Based Access Control Tech Monday, 08 March 2021Monday, 08 March 2021 by Srijith NairHow OAuth is related to Attribute Based Access ControlWhat is Authorization? Authorization, also Read more...
  • Enterprise-Authorization-System Business Friday, 15 January 2021Wednesday, 03 February 2021 by Srijith NairModern Enterprise Authorization Management SystemGartner has an interesting article titled Read more...

Still have questions?

Send us an email at webinfo@axiomatics.com
Request a Demo

Axiomatics

  • Supplier Code of Conduct
  • Cookie Notice
  • Privacy Policy
  • Working at Axiomatics
  • It’s easy to contact Axiomatics!
  • Get Support
Copyright © 2013 - 2021 Axiomatics. All rights reserved.