GCN Article: How Agencies Can Control Access to IoT Data

Dynamic authorization with attribute-based access control allows agencies to securely share IoT data by only allowing authorized users access to sensitive data under the right conditions. This article originally appeared in GCN. How agencies can control access to IoT data BY GERRY GEBEL | MAY 09, 2019 Mobile devices, embedded software and internet-of-things sensors are now […]

Axiomatics to Speak at KuppingerCole European Identity and Cloud Conference 2019

Gerry Gebel and David Brossard to Present at KuppingerCole European Identity and Cloud Conference 2019 Thought Leaders from Axiomatics Return to Speak During Two Sessions at #EIC19 May 14-17 in Munich, Germany CHICAGO – May 7, 2019 – Axiomatics, the leader in externalized, fine-grained dynamic authorization, today announced that Gerry Gebel, vice president of business […]

Axiomatics Announces Technology Partnership with Tableau

New Integration enables Fine-Grained Authorization to Data in the Tableau Platform CHICAGO – April 16, 2019 – Axiomatics, the leader in externalized, fine-grained dynamic authorization, today announced it has been named a certified Technology Partner with Tableau Software. This partnership is driven by the integration of the Axiomatics SmartGuard® for Big Data and the Axiomatics […]

Digital Journal Q&A: How to control access to IoT data

Q&A: How to control access to IoT data By Tim Sandle This article appeared in Digital Journal. IoT is responsible for driving the biggest quantity of data into data lakes for businesses to analyze and leverage for analytics. With so much data at stake, companies must control who can and cannot access that data. This is […]

How Can Federal Agencies Secure Data Services in the Cloud

This article originally appeared in American Security Today. By Gerry Gebel, VP of Business Development at Axiomatics As businesses continue their mass migration of data, applications, workflows and other business assets to the cloud, federal agencies are following suit, and for a good reason. By utilizing the cloud, federal agencies minimize their overall IT costs, […]

CMSWire.com: What You Need to Know About DevSecOps

What You Need to Know About DevSecOps by Kaya Ismail, CMS Wire The 5th annual DevSecOps Community Survey conducted by Sonatype in 2018, revealed there was a heightened interest in DevSecOps practices. Out of the 2,076 IT professionals that took part in the survey, 33 percent said they suffered from a verified breach within a 12 month […]