This month Gartner published their “hype cycles” for 2017. These reports provide a barometer for various technologies within a given market or area of discipline. They represent Gartner’s latest view on the maturity level, adoption rate, and the value of technologies within the particular
We’re always looking for ways to get involved with local colleagues in the IAM space. In a recent session, we met with some of our peers at the Wisconsin IAM Meetup group in Waukesha, WI. I wanted to share some detail on these local Meetups, as there is benefit for technical, business and sales
Part 2: OAuth Scopes May Not be Enough This is a multi-part series of articles describing why and how one can approach applying Externalized Dynamic Authorization to an API and/or microservices architecture that uses OAuth 2.0 flows and/or OpenID Connect (OIDC). Externalized Dynamic Authorization
This post explains how to apply fine-grained dynamic data masking using the Axiomatics Data Access Filter MD (for Multiple Databases), while minimizing changes to applications that consume the data. When fine-grained dynamic data masking must also preserve referential integrity and value format.
In a previous blog post Andrew Hindle discussed the difference between Data Access Filtering and Dynamic Data Masking. This blog post investigates the advantages of combining these two approaches. As of version 1.2, the Axiomatics Data Access Filter for Multiple Databases (ADAF MD) introduces
Data Filtering is a powerful new technique to ensure that sensitive data stays safely in the database. Many companies have already deployed Data Masking as part of their data protection strategy. In this post, we’ll review the key differences between data masking and dat filtering, highlighting