DZone Feature: Secure Java REST APIs With JSON, XACML, and ALFA

How to use a JSON XACML Policy Enforcement Point to secure REST API endpoints using ALFA, XACML, and JSON. by David Brossard, for DZone In this post, we’ll look at how to use a JSON XACML Policy Enforcement Point to secure REST API endpoints. We will use ALFA, XACML, and JSON to do so. Setting […]

Axiomatics Launches Dynamic Authorization Extension for Microsoft® SharePoint

The Axiomatics Extension for SharePoint was developed in collaboration with Knowit Secure. By extending dynamic fine-grained access control using an Attribute Based Access Control framework into SharePoint

CSO Online Feature: Why You Need Both Authorization and Authentication

How to effectively manage IAM controls to secure critical assets by Gerry Gebel In previous posts I have discussed in depth the importance of authorization, specifically dynamic authorization, to control access to critical information assets. However, authorization is only a portion of the access control equation, another piece that organizations require is the authentication step […]

Axiomatics to Address Hot-button Authorization Issues at KuppingerCole European Identity and Cloud Conference

Måns Håkansson and David Brossard to Present at European Identity and Cloud Conference (EIC) May 15-18 in Munich, Germany CHICAGO – April 24, 2018 – Leading fine-grained dynamic authorization company Axiomatics today announced that David Brossard, vice president of customer relations, and Måns Håkansson, solutions architect, will present at the KuppingerCole European Identity and Cloud […]

Axiomatics Releases Best-in-Class Data Access Filter Upgrade

Axiomatics Launches Data Access Filter for Multiple Databases Upgrade to Enhance Easy-to-Use Configuration API and User Interface CHICAGO (April 18, 2018) – Axiomatics, the leader in fine-grained dynamic authorization, today debuted an upgrade to its Axiomatics Data Access Filter for Multiple Databases, designed to deliver fine-grained dynamic authorization for data-centric security. Key enhancements include an […]

CSO Online Feature: How important defense in depth will be as the lines between security layers blur

By Gerry Gebel (This article originally appeared in CSO Online.) What key roles defense in depth and layered security will play in the digital age. Defense in depth and layered security feel like terms from a much simpler era in information security. It was not too long ago when these concepts seemed more applicable during […]