+

Leading US investment bank chooses dynamic authorization from Axiomatics

Stockholm, January 27 2014 – Axiomatics is pleased to announce that yet another leading investment bank has chosen to deploy the company’s dynamic authorization solution. The centrally managed system, which will form part of a new Identity and Access Management (IAM) program, currently being rolled-out at the firm, will support effective collaboration and safeguarding of business critical information assets.

Axiomatics, the leading provider of dynamic authorization, today announced yet another leading US investment bank has deployed its technology. The Bank, which has offices on three continents and focuses on investor services; corporate banking; merger and acquisitions advisory; wealth management; and investment management; is currently rolling out a new Identity and Access Management (IAM) program throughout its organization.

Axiomatics was awarded the contract as its dynamic solution performed best in a number of key next generation authorization requirements. The solution can be deployed across a complex multi-tiered IT infrastructure consisting of both legacy and modern systems. Employees can securely access client data in real-time, in accordance with corporate policies. The need to write customized code for individual applications is removed. Instant audits of authorization rights, which provide a complete overview of who can access what information, can be carried out. And, it supports the bank in meeting regulatory requirements in all its markets.

“We are extremely proud to add yet another Fortune 500 investment bank to our customer portfolio,” says Axiomatics America President, Gerry Gebel. “Being able to offer authorization services that give them a competitive advantage has been decisive in winning this contract.”

The contract consists of Axiomatics Authorization for Applications solution. In addition to the best-in-class authorization service, the solution includes a unique auditing tool that not only provides a list of who can access what information in the organization, it also allows administrators to see exactly what information they can view and under what circumstances. Initial roll-out is expected to be completed by mid 2014.

“Inline with Gartner’s recent prediction that by 2020, 70 percent of enterprises will be implementing Attribute Based Access Control – the foundation that our technology is built on – we are witnessing a major increase in the take up of our technology,” continues Gebel. “And it’s not just from the financial services industry, whenever there is sensitive information at stake, next generation authorization is needed to do business effectively and securely.”

Other News

Press Release
Four Role-based Access Control (RBAC) Limitations and How to Fix Them
Adopting attributed-based access control (ABAC) enables enterprises to extend existing roles using attributes and policies CHICAGO, IL – September 23, 2021 – In the advent...
Press Release
Axiomatics Awarded ISO 9001 and ISO 27001 Certifications
Certifications validate the company’s commitment to secure, high-quality handling and delivery of products and services CHICAGO – 13 September 2021 – Axiomatics, the leader in...
Press Release
Axiomatics Debuts New MuleSoft Certified Connector
Connector enables enterprises to eliminate custom coding of security rules, speeding time-to-market