+
  • Category: Business

Untangling zero trust with dynamic authorization

Zero Trust
Everyone is talking about Zero Trust and with good reason. With the proliferation of remote and hybrid workforces and people accessing corporate networks from a...

3 keys to re-evaluate your authorization management

Business
On May 27, I had the pleasure to join the KuppingerCole KCLive event with several industry peers in a panel discussion about  “Enabling the Future...

Modern Enterprise Authorization Management System

Business
Gartner has an interesting article titled “Modernize Your Runtime Authorization” that highlights some aspects you need from a modern enterprise authorization systems. Over the years...

Mastering GDPR and CCPA Compliance with Dynamic Authorization

Business
Global regulatory legislation is a headache for almost every business, especially large,multi-national corporations. Organizations operating across borders must manage diverse regulations specific to each country....

Multi-Dimensional Security 101: A Beginners Guide to Attribute Based Access Control 

Business
As new technologies emerge and hackers continue to develop new techniques, your enterprise data becomes more vulnerable each day. The days of storing information in...

Critical Data Security Trends 2019

Business
In case you missed our press release on the Critical Data Security Trends for 2019, we’re sharing the list here on the blog for the...

Combining Federated Identity Management with Dynamic Authorization

Business
Axiomatics’ Vice President of Business Development, Gerry Gebel, was interviewed by Cynthia Artin on the intersection of Federated Identity Management with Dynamic Authorization. The virtualization...

Applying Dynamic Authorization to Cloud Technologies

Access Control 101
Is your business preparing to move to the cloud? Or have you already adopted the cloud and are looking for ways to enhance cloud security...

Axiomatics Integrates Dynamic Authorization with Mulesoft Anypoint Platform

Business
We recently announced our partnership with MuleSoft and the new integration with their Anypoint Platform™. Axiomatics now augments existing access control with a customizable API...

The State of the Union of Authorization

Business
A couple months ago, I had the pleasure to talk at the European Identity Conference on a topic that is close to my heart: authorization....

Intro to Attribute Based Access Control (ABAC)

Business
Access control has gone beyond simply need-to-know to include need-to-share authorization. Traditionally, the focus of authorization and access control has been on building barriers to...

Securing Cloud Infrastructure with Dynamic Authorization

Business
Today, it is imperative for businesses to increase scalability and enable collaboration among development teams to help solve complex challenges, all while cutting down on...

Video Blog: Authorization Made Simple: Secure Applications with ALFA, REST, and JSON

Business
Across industries, businesses are focusing more on their IT departments and developing more applications than ever before. If your team needs to deliver a microservice,...

Identiverse 2018 Roundup

Business
We’re fresh off the heels of Identiverse 2018 (formerly the Cloud Identity Summit) in Boston.  Hundreds of attendees joined together to share their perspectives on...

Axiomatics and Saviynt Partnership Brings Externalized Dynamic Authorization and Identity Governance and Administration Solutions Together

Business
Earlier this week, we announced our partnership with Saviynt, a leading provider of identity governance and cloud security solutions. The partnership allows for the Axiomatics...

Live from Identiverse 2018 in Boston

Business
A team from Axiomatics is currently in Boston to exhibit and speak at Identiverse 2018 (formerly known as Cloud Identity Summit). People, applications and devices...

The Build vs Buy Decision

Business
Authorization of user access to data and applications is more important than ever – and enterprises are looking to solve this in the best way...

Executive Spotlight: Interview with Erika Boije, VP Engineering at Axiomatics

Business
After more than a decade as a consultant, and then CTO of a mobile payment company, Erika Boije discusses what drew her to Axiomatics and...

A Look Back at EIC 2018

Business
Last week we exhibited at the 2018 European Identity & Cloud Conference in Munich. For the 12th year, the EIC conference offered best practices and discussions...

European Identity & Cloud Conference 2018

Business
We’re currently exhibiting at the 2018 European Identity & Cloud Conference in Munich. The conference is Europe’s leading event for Identity and Access Management (IAM), Governance,...

The Axiomatics Customer Experience (ACE) 2018

Business
A month ago we gathered in Chicago for the inaugural Axiomatics Customer Experience. We wanted to get to know our customers even better, and I...

An Opportunity to Rebuild Customer Trust and Ensure Data Loyalty: GDPR

Business
Over the past year, you’ve no doubt been bombarded with news and opinions on the GDPR. “Who will be affected?” “Are you prepared?” “Will the...

Video Blog-Moving Beyond Identity-Based Access Control

Business
Axiomatics’ solutions implement Attribute Based Access Control (ABAC). This means that, when processing an access control request, digital rules can be evaluated to consider the...

IAM: The Glue That Holds It All Together

Business
In a decentralized, decoupled, distributed world, where each (micro) service fends for itself and modules are pieced together to deliver leaner, laser-focused functionality, there is...

Top Federal Government Security Trends for 2018

Business
DevOps, Information Dissemination, Safeguarding Sensitive Data and Data Monitoring Dominate Federal Security Practices in 2018 Secure data sharing remains a challenge among intelligence agencies and...

Applying ABAC to Cloud Technologies

Business
Is your business or agency preparing to migrate to cloud technologies in 2018? Or have you already adopted the cloud and are looking for ways...

Gartner IAM Summit 2017 – Las Vegas

Business
The theme at Gartner IAM Summit this year was “Transform Operations to Opportunities”, and it led to five tracks: Foundational Strategies, Moving Your IAM Program...

Managing DevOps with Dynamic Authorization

Business
Security technologies, like Dynamic Authorization, are an integral part of the DevOps methodology and should be managed in the same manner as the application itself....

They Wrote the Book on ABAC

ABAC
Artech House has just published a book on Attribute Based Access Control, authored by Vincent Hu, David Ferraiolo, Ramaswamy Chandramouli and Richard Kuhn. These names...

Digital Transformation: Securing Customer-centric Initiatives

Business
Data security and an improved customer experience go hand in hand for successful digital transformation. “The customer is always right” is a motto originating in...

Securing Access to PII and EHR in a Digitized Health Care Environment

Business
Patient Enablement / Self-service With respect to health care, a McKinsey report from late 2014 explains that health care IT is evolving at the same...

Cybersecurity Week in Luxembourg

Business
A week-long cybersecurity event in Luxembourg included Axiomatics’ participation in the PwC Cybersecurity Day last Thursday. Luxembourg City was a terrific host and provided a...

Why Layering Your Security is Important

Business
An Argument for Multi-Layered Security in Wake of the Equifax Breach Winter weather can be brutal. Layers come in handy to protect from the cold,...

Enabling Digital Transformation: Digital Identity and Access Management (DIAM)

Business
Earlier this summer, I hosted a live webinar with our partners at EY, where we discussed the Digital Transformation trend and its impact on Digital...

A Note from Consumer Identity World US 2017

Business
Last week, I was fortunate enough to attend and take part in Consumer Identity World (US) in Seattle, KuppingerCole’s first conference this side of the Atlantic....

Enhancing API Security: Dynamic Authorization to Protect Sensitive Data

Business
API Gateways effectively manage the authentication of the user and provide service orchestration capabilities, but if sensitive data is involved, additional fine-grained authorization capabilities are...

Gartner Hype Cycle for Application Security 2017

Business
This month Gartner published their “hype cycles” for 2017. These reports provide a barometer for various technologies within a given market or area of discipline....

Is Your Content Management System Putting You At Risk?

Business
Or in short, how CMS security can benefit from ABAC. What is Content Management? Content management (CM), is a set of processes and technologies that...

Highlights from Cloud Identity Summit 2017

Business
Cloud Identity Summit took place in Axiomatics Americas backyard this year: downtown Chicago! More than 1,500 individuals – a record-breaking attendance count – shared their...

Axiomatics Partners with SailPoint, Sponsors Navigate Austin 2017

Business
Earlier this month, we officially announced our partnership with SailPoint. In brief, Axiomatics will extend SailPoint’s identity management solutions by adding the richness of Axiomatics’ run...

Axiomatics to Present at Cloud Identity Summit in Chicago

Business
Cloud Identity Summit (CIS) is recognized as the world’s premier identity industry conference and includes tracks from industry thought leaders, CIOs, executives and practitioners. CIS,...

How Dynamic Authorization Can Support GDPR Compliance

Business
If you missed part 1 or 2 of our GDPR blog series, you can find them here: Part 1: A GDPR Primer: What You Need...

A Look at EIC 2017

Business
European Identity Conference (EIC) is Europe’s leading event for Identity and Access Management (IAM) and Governance, Risk Management, and Compliance (GRC), and cloud security. For...

GDPR: A Driver for Digitalization

Business
In our previous entry, we talked about how General Data Protection Regulation, or “GDPR”, enables EU citizens to control their data profiles, or “digital footprint”....

A GDPR Primer: What You Need to Know

Business
The General Data Protection Plan, known by GDPR, is new legislation that defines data protection standards and laws across the European Union. This regulation effectively repeals...

Customer Identity, Contextual Security, and More: What We Learned at Gartner’s 2016 IAM Conference

Access Control 101
This year’s Gartner IAM Conference was full of thoughtful keynotes and a reflection of things to come for IT professionals in 2017. Over 1500 professionals...

We’re heading to London – see you at the Identity Management Event!

Business
This Wednesday, November 9th, Axiomatics and other industry leaders from large enterprises and government agencies alike will attend IDM UK in London. This will be...

The Big Data Security Challenge

Business
Big data is one of the “big” industry trends that is challenging enterprises these days, especially from a data security perspective. Thanks to the explosion...

ABAC, the dynamic authorization solution for your APIs and Applications

Business
Scale the heights of enterprise access control: IT and security leaders in large organizations often find themselves standing at the foot of a daunting mountain....

Dynamic Authorization: The Natural Evolution of Access Control

Business
Access Control has been around ever since there has been the need to protect valuable assets. Sentries were posted and moats were built. Still, history...

Attribute Based Access Control Beyond Roles

Business
Over the past 20 years the IT road map has changed beyond recognition. Cloud computing, smartphones and online services are part of our daily routines....

Can Dynamic Authorization Help Resolve Manufacturers’ Security Concerns About IoT?

Business
The Internet of Things (IoT) has revolutionized business intelligence within manufacturing. The availability of product data means companies no longer need to rely on customers...

Solving the Manufacturing Data Protection Triangle

Business
How ABAC Can Help Protect IP and Speed Time-To-Market. Manufacturers face unique challenges when it comes to data protection. With digital transformation upon them, many...

Cloud Identity Summit 2016

Business
The 2016 Cloud Identity Summit is fast approaching and we’re a sponsor of the show this year. As a long-term partner of Ping Identity, we’ve...

ABAC, part and parcel of an effective anti-fraud program

Business
So how should financial institutions act? Well, in its 2015 report “Current Fraud Trends in the financial sector”, PwC identified the key components of an...

Compliance in the Financial Sector: Driving Transformational Change From the Inside Out

Business
It’s no secret that dealing with compliance is becoming more complex and costly. In 2013, Thomas Reuters reported that there were 110 new regulatory announcements...

5 Burning Issues in the Financial Services Industry and How ABAC Can Help

Business
In this blog post we will present 5 burning issues within the financial services industry and how Attribute-Based Access Control can help tackle some of...

Trends to watch in 2016

Business
We’re well into the start of 2016, so we better get our observations about trends to watch out there before it’s too late! There are...

Safe Harbor and Access Control for Transatlantic Data Transfer

Business
The deal was made public on February 2nd, two days after the initial agreed upon deadline for a solution had passed. Speaking on the deal,...

Eliminating Toxic Combinations with ABAC

Business
Over the past 20 years, the IT road map has changed substantially. Cloud computing, smartphones and online services are part of our daily routines. And...

Six Key Reasons why you need to protect EHR with Dynamic Authorization Today

Business
If you store or process medical records you have a target on your back The health care industry suffers 340% more security incidents and attacks...

The Physics of Coarse- and Fine-grained Authorization

Business
In his recent blog, Homan Farahmand of Gartner discussed the differences between coarse-grained and fine-grained authorization, likening them to the study of classical and quantum...

Securing Access to PII and EHR in a Digitized Health Care Environment

Business
Patient enablement / self-service With respect to health care, a McKinsey report from late 2014 explains that health care IT is evolving at the same...

Safe Harbor: The Access Control Quandary

Business
When it comes to the way personal data is handled in the global economy, this changes everything. Well at least it does for the 4,500...

The End of Safe Harbor

Business
  If you share European citizens’ personal data with the US or across European jurisdictions and you don’t have a contingency plan in place, you...

CA World 2015

Business
A quick hello from CA World 2015! Axiomatics is a sponsor again this year and we’re holding up after a very busy day one. After...

Announcing ADAF MD support for Teradata and further SQL operation coverage

Business
First of all, we add the Teradata Database to the growing list of relational database systems that we support. We have had increased demand for...

The truth, the whole truth and nothing but the truth: 5 API access control considerations

Business
Whether it’s via a mobile, laptop or desktop, in the cloud or on the ground, APIs have become the defacto method for connecting people with...

End-user or B2B Portal – a business case for API management

Business
Common use case scenarios which the Axiomatics Professional Services Organization (PSO) frequently encounters are customer portals in various shapes and flavors. A common denominator in...

“What about mobile?”

Business
When I first started in mobile security nearly ten years ago ‘mobile’ was synonymous with laptops, the greatest security challenge was securing data at rest...

Data privacy and protection requirements – obstacles or business enablers?

Business
The global economy fuels constant growth in cross-border data flows. Yet, borders block trade in the cloud as well as on the ground.  In 2002,...

Announcing APS 6.0 – The industry’s first web-based graphical UI for XACML policy creation and editing

Business
In addition to the policy editor, APS 6 also introduces the notion of attribute namespaces that help to enable and enhance collaboration in policy writing...

Beyond RBAC and towards ABAC – More Tales from Down Under

Business
Business Analysts are the optimal policy authors “Who writes the policies” is often a question we are asked by customers who are new to the...

Fine-grained data access control across Oracle, IBM DB2 and SQL Servers

Business
In 1668, when Thomas Hobbes wrote ‘knowledge is power’* for the first time ever, it is unlikely he was thinking of knowledge in terms of...

Beyond RBAC and towards ABAC – Tales from Down Under

Business
Business vs. Security Rules How do I determine the difference between a business rule and a security rule? Remarkably, this question came up during three consecutive...

To Filter data, or to Mask data… or both?

Business
Data Filtering is a powerful new technique to ensure that sensitive data stays safely in the database. Many companies have already deployed Data Masking as...

XACML vs. Drools: A Comparison

Business
Enterprises have several options when considering how to address the authorization function for in-house developed applications. In this post, we will compare and contrast the...

Webinar recordings, presentation and ALFA news

Business
A quick post to summarize some developments and webinars that have taken place recently. Axiomatics has decided to make its domain specific authorization language ALFA...