Authorization of user access to data and applications is more important than ever - and enterprises are looking to solve this in the best way possible. That includes weighing a "Do It Yourself" in-house scenario vs. outsourcing to a qualified vendor. When making a Build vs Buy decision for IAM
After more than a decade as a consultant, and then CTO of a mobile payment company, Erika Boije discusses what drew her to Axiomatics and how she sees dynamic authorization shaping the future of access control. She specializes in agile working, architecture, system integrations, especially
Last week we exhibited at the 2018 European Identity & Cloud Conference in Munich. For the 12th year, the EIC conference offered best practices and discussions with more than 800 participants from worldwide companies including most of the leading vendors, analysts, end users, thought leaders,
How to effectively manage IAM controls to secure critical assets In previous posts I have discussed in depth the importance of authorization, specifically dynamic authorization, to control access to critical information assets. However, authorization is only a portion of the access control
We're currently exhibiting at the 2018 European Identity & Cloud Conference in Munich. The conference is Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. For the 12th year, the EIC will offer best
A month ago we gathered in Chicago for the inaugural Axiomatics Customer Experience. We wanted to get to know our customers even better, and I wanted to create a community so that our customers could exchange ideas with one another. The event had three aims: Strengthen the ties between our
We’ve been hearing from our customers about evolving use cases around data-centric security, and the need to closely manage access to data sets – across relational databases and Big Data stores. Our approach to data filtering fuels data-centric security and enables visibility and control by
When thinking about important business assets you probably think of tangible items like property, vehicles, computers, etc., but for many organizations, it’s the intangible digital assets that are a top priority. Having a clear data strategy is absolutely critical to business success because data
Over the past year, you’ve no doubt been bombarded with news and opinions on the GDPR. “Who will be affected?” “Are you prepared?” “Will the deadline be extended?” “How are we going to find a Data Protection Officer in time?” “What even is a Data Protection Officer?”
In this post, we take a look at what security and dev teams should both do, and not do, to create a security-friendly environment. Security is the responsibility of all of us. Given the visibility and public disclosure that results from cyberattack breaches, cybersecurity and enterprise readiness