European Identity & Cloud Conference 2018

We’re currently exhibiting at the 2018 European Identity & Cloud Conference in Munich. The conference is Europe’s leading event for Identity and Access Management (IAM), Governance, Risk Management and Compliance (GRC), as well as Cloud Security. For the 12th year, the EIC will offer best practices and discussions with more than 700 participants from worldwide companies including most of the leading vendors, end users, thought leaders, visionaries and analysts.

Stop by Booth G7 in the main hall to chat with our team about externalized dynamic authorization, GDPR, and your access management needs. And don’t miss our presentations on Wednesday and Thursday:

IAM Blueprint & Compliance

How to Transform Your Data Protection Program Under GDPR

Måns Håkansson, Solution Architect, Axiomatics

Wednesday, May 16th, 11:00-12:00


Dynamic Authorization

Identity Solved. What next? Tackling your Toughest Authorization Challenges

David Brossard, VP Customer Relations, Axiomatics

DATE: Thursday, May 17th TIME: 12:00-13:00


Panel: How Will Authorization Look in the Future? XACML, OAuth, or Proprietary?

David Brossard, VP Customer Relations, Axiomatics

David speaks on this panel as one of the editors of the XACML technical committee. Don’t miss it! 

DATE: Thursday, May 17, 2018  TIME: 14:30-15:30  LOCATION: ALPSEE

API Security

The Value of Adding Policy Management in API Security Gateways for Implementing ABAC

David Brossard, VP Customer Relations, Axiomatics

DATE: Thursday, May 17th TIME:  17:00-18:00

If you would like to arrange a meeting or demo with us in advance, fill out this short form and we will reach out to you.

Other Blogs

3 keys to re-evaluate your authorization management
On May 27, I had the pleasure to join the KuppingerCole KCLive event with several industry peers in a panel discussion about  “Enabling the Future...
How OAuth is related to Attribute Based Access Control
What is Authorization? Authorization, also referred to as Access Control, is the process that follows authentication (which checks your identity and ensures that you are...
Modern Enterprise Authorization Management System
Gartner has an interesting article titled “Modernize Your Runtime Authorization” that highlights some aspects you need from a modern enterprise authorization systems. Over the years...