Whats New Archives - Axiomatics
Axiomatics
  • Dynamic Authorization Suite
    • Applications
    • SmartGuard® for Data
    • Databases
    • APIs and Microservices
      • Amazon API Gateway Integration
      • Apigee Integration
      • Axway API Integration
      • CA API Gateway Integration
      • IBM DataPower Gateway Integration
      • Kong Community Integration
      • MuleSoft Integration
      • Oracle API Gateway Integration
    • IAM Ecosystem Integrations
    • Reporting & Governance
    • Expert Services
  • Developers Zone
  • Resources
    • About Us
    • Analyst Reports
    • Case Studies
    • Data Sheets
    • Industry Briefs
    • Infographics
    • Product Sheets
    • Tutorials
    • Use Cases
    • Webinars
    • White Papers
  • Solutions
    • Challenges
    • Industries
    • Roles
  • Axiomatics Federal, Inc.
  • Blog
  • About Us
    • The Company
    • Working at Axiomatics
    • Press Room
    • Events
    • Partners
    • Management
    • Corporate Social Responsibility
    • Contact Us

Whats New

Home / Whats New
Business Friday, 15 January 2021Wednesday, 03 February 2021 by Srijith Nair

Modern Enterprise Authorization Management System

Gartner has an interesting article titled "Modernize Your Runtime Authorization" that highlights some aspects you need from a modern enterprise authorization systems. Over the years I have seen several adjectives being used to describe an advanced authorization management system. These capture
Business Tuesday, 03 November 2020Monday, 18 January 2021 by Axiomatics

Mastering GDPR and CCPA Compliance with Dynamic Authorization

Global regulatory legislation is a headache for almost every business, especially large,multi-national corporations. Organizations operating across borders must manage diverse regulations specific to each country. Today, we see an evolution of data privacy-specific laws to formalize, unify and
Business Monday, 13 July 2020Thursday, 10 September 2020 by Pablo Giambiagi

Multi-Dimensional Security 101: A Beginners Guide to Attribute Based Access Control 

As new technologies emerge and hackers continue to develop new techniques, your enterprise data becomes more vulnerable each day. The days of storing information in a single, on-premise database are over. As a result, businesses are searching for new, modern technologies and techniques to secure
Tech Wednesday, 01 April 2020Monday, 27 April 2020 by Axiomatics

Zero Trust Network Access Eliminates Wide Network Access Perimeters 

Network access security is quickly evolving as the amount of data produced by an organization increases. Combine this with the rapid increase of remote working around the world and employees needing that secure data quickly to stay productive. Traditionally, network security was about protecting
Tech Monday, 21 October 2019Wednesday, 01 April 2020 by Axiomatics

Stack Overflow: What’s the difference between policy target and rule target in XACML?

Are you looking for further clarification in working with XACML? This post originally appeared on Stack Overflow. Question: XACML allows us to specify <Target> tag in both <Policy> as well as in <Rule> tags. What I would like to understand is that: What is the
Tech Monday, 30 September 2019Friday, 27 September 2019 by David Brossard

Protect What Matters Most: The Data — Part 2

Protect What Matters Most: The Data -- Part 2, Data-Centric Security Welcome to Part 2, of Protect What Matters Most: The Data. You can find Part 1 here, if you didn't catch it. A while back, my colleague, Gerry Gebel, and I delivered a webinar on the very topic of data-centric authorization.
Tech Monday, 23 September 2019Wednesday, 20 November 2019 by David Brossard

Protect What Matters Most – The Data

Protect What Matters Most: Fine-grained, Policy-based Authorization for your Data Introduction When I speak to customers about what Axiomatics does (fine-grained, externalized, policy-based access control), I tell them that historically access control was implemented within each and every app or
Tech Tuesday, 16 July 2019Tuesday, 16 July 2019 by Axiomatics

Stack Exchange: Looking for an Approach to Implement Attribute Based Access Control (ABAC)

This Q+A originally appeared on Information Security Stack Exchange.  Question: We are looking to implement Attribute-Based Access Control. While we are sold on the philosophy, there are two topics that seem to crop up: Will it lead to significant performance issues? Especially
Tech Friday, 05 July 2019Tuesday, 07 April 2020 by Axiomatics

Stack Overflow: MERN Stack Authorization and Authentication

Are you working with MERN (Mongo, Express, React-redux, Node) and Authorization? This Stack Overflow post details the question at hand, and then how to use dynamic authorization with MERN. It originally appeared on Stack Overflow. Question I am creating a MERN (Mongo, Express, React-redux, Node)
Tech Tuesday, 18 June 2019Friday, 05 July 2019 by Axiomatics

Authorize Like a Pro with Axiomatics + UMA – Guest Blog Post from Gluu

Today's blog post is a post from one of our partners, Gluu. The feature writer is Mike Schwartz. He has been an entrepreneur and identity specialist for more than two decades. He is the technical and business visionary behind Gluu. Mike is an application security expert and has been a
12345...Last PageNext

Subscribe to the blog

  • Authors
  • Categories
  • Tags
Srijith NairSrijith Nair
AxiomaticsAxiomatics
Pablo GiambiagiPablo Giambiagi
David BrossardDavid Brossard
Jonas IggbomJonas Iggbom
Andres MartinelliAndres Martinelli
Gerry GebelGerry Gebel
Kelly SheltonKelly Shelton
Mike GoodMike Good
Niklas JakobssonNiklas Jakobsson
Brian ColalucaBrian Colaluca
Craig GilleyCraig Gilley
Jonas MarkströmJonas Markström
Jeffrey KleinJeffrey Klein
See More Authors
  • Business Tech Question of the Week Access Control Access Control 101 Architecture API Axiomatics Data Access Filter XACML The Company ABAC Health Insurance Safe Harbor Cross-Border Privacy API
  • Whats New What's New federal government events Dynamic Authorization data security Data Centric Security Cloud Authorization Attribute Based Access Control API Access Control ABAC101 ABAC 101 ABAC

Featured Posts

  • How OAuth is related to Attribute Based Access Control Tech Monday, 08 March 2021Monday, 08 March 2021 by Srijith NairHow OAuth is related to Attribute Based Access ControlWhat is Authorization? Authorization, also Read more...
  • Enterprise-Authorization-System Business Friday, 15 January 2021Wednesday, 03 February 2021 by Srijith NairModern Enterprise Authorization Management SystemGartner has an interesting article titled Read more...

Still have questions?

Send us an email at webinfo@axiomatics.com
Request a Demo

Axiomatics

  • Supplier Code of Conduct
  • Cookie Notice
  • Privacy Policy
  • Working at Axiomatics
  • It’s easy to contact Axiomatics!
  • Get Support
Copyright © 2013 - 2021 Axiomatics. All rights reserved.