DZone: Why Attribute-Based Access Control – The Evolution from RBAC to ABAC in Data Access Control

Learn more about the evolution from RBAC to ABAC in data access control. A feature article in DZone by Måns Håkansson Evolving from ACLs and RBAC, ABAC is now the standard model for organizations to ensure employees only have access to the information they need under the right circumstances. Today, data is often characterized as […]

JAXenter: Predictions for the new year – Crucial data security trends and challenges for 2019

2019 has only just begun – what will the year hold? Ring in the new year with tech predictions from the experts. Today, Pablo Giambiagi, Vice President of Strategic Research at Axiomatics dives into the trends and challenges for data security in 2019. Read the article in its entirety here. Predictions for the new year: […]

Insights Success: Axiomatics Feature

Axiomatics: An Independent Leader in Dynamic Authorization Solutions Axiomatics was featured in Insights Success as the leader in dynamic authorization. Read the full article here: Axiomatics: An Independent Leader in Dynamic Authorization Solutions   Headquartered at Stockholm, Sweden, Axiomatics provides access control software that protects the most critical assets of today’s modern enterprises. This includes applications and […]

Data Center Post: The Stark Reality of Insider Threat

Data Center Post: The Stark Reality of Insider Threat, and What Your Business Can do about It. By Gerry Gebel, Vice President of Business Development at Axiomatics Modern access control technologies like dynamic authorization can ensure information isn’t exposed to unauthorized users within an organization. Businesses and government agencies worldwide hold information that, if it fell into the […]

TMCnet InfoTech Spotlight: Federated Identity Management and Dynamic Authorization

TMCnet InfoTech Spotlight: Combining Federated Identity Management with Dynamic Authorization The virtualization of nearly everything digital is pushing more and more applications, services, storage, and compute to the cloud, now including real time communications (voice, video, messaging, collaboration) and combinations of connected machines and humans. Enterprises, governments, and individuals are operating in continuous contact, in […]

Enhancing Cloud Security for AWS Deployments

As organizations continue to move their IT infrastructure to AWS or other cloud providers, addressing complex access control use cases with dynamic authorization is essential. by Gerry Gebel for CSO Online So many organizations are migrating their entire IT infrastructure to the cloud and adopting a “cloud first” approach. With this approach, organizations cut down […]