+
  • Feature Story

Safeguarding an Essential Business Asset: Enterprise Data

Feature Story
To take advantage of enterprise data, organizations must first make that data available to key decision-makers within the company. The ability to securely access, share, and analyze data to uncover insights and meet business objectives is essential to success. Companies are storing data across different data stores and cloud platforms, ensuring only authorized users have access to the right information under the right circumstances. This is crucial. 

How to Access Sensitive and Regulated Data Through Microservices and APIs

Feature Story
This article appeared recently in DZone. Written by Gerry Gebel the Vice president of Business Development at Axiomatics. How to Access Sensitive and Regulated Data...

Information Management: 6 Data Security Trends and Challenges for Federal Agencies in 2020

Feature Story
This article appeared recently in Information Management. Written by Gerry Gebel the Vice president of business development at Axiomatics. Six Data Security Trends and Challenges...

SC Magazine: DevOps to DevSecOps: How to ensure a smooth transition

Feature Story
This article by Niklas Jakobsson, CEO of Axiomatics, originally appeared in SC Magazine. SC Magazine: DevOps to DevSecOps: How to ensure a smooth transition Security...

GCN Article: How Agencies Can Control Access to IoT Data

Feature Story
Dynamic authorization with attribute-based access control allows agencies to securely share IoT data by only allowing authorized users access to sensitive data under the right...

How Can Federal Agencies Secure Data Services in the Cloud

Feature Story
This article originally appeared in American Security Today. By Gerry Gebel, VP of Business Development at Axiomatics As businesses continue their mass migration of data,...

VMblog shares Axiomatics 2019 Predictions: Data Security

Feature Story
2019 Modern Data Center Technology Prediction Series Industry executives and experts share their predictions for 2019. Gerry Gebel, our VP of Business Development, contributed this...

IT Pro Portal:Critical Data Security Trends for 2019 and beyond

Feature Story
An article by Gerry Gebel in www.itproportal.com; IT Pro Portal covers the Critical Data Security Trends for 2019 and beyond.  It originally appeared here. Critical...

CloudPost: Seven Big Data Security Trends of 2019

Feature Story
2018 was a monumental year for cloud technologies and data security. As businesses moved application workflows to the cloud, they were forced to manage new...

DZone: Breaking Down the DevSecOps Approach

Feature Story
Take a look at how DevSecOps truly works to make your apps more secure. A feature article in DZone by Gerry Gebel. To keep pace...

DZone: Why Attribute-Based Access Control – The Evolution from RBAC to ABAC in Data Access Control

Feature Story
Learn more about the evolution from RBAC to ABAC in data access control. A feature article in DZone by Måns Håkansson Evolving from ACLs and...

JAXenter: Predictions for the new year – Crucial data security trends and challenges for 2019

Feature Story
2019 has only just begun – what will the year hold? Ring in the new year with tech predictions from the experts. Today, Pablo Giambiagi,...

Insights Success: Axiomatics Feature

Feature Story
Axiomatics: An Independent Leader in Dynamic Authorization Solutions Axiomatics was featured in Insights Success as the leader in dynamic authorization. Read the full article here:...

Data Center Post: The Stark Reality of Insider Threat

Feature Story
Data Center Post: The Stark Reality of Insider Threat, and What Your Business Can do about It. By Gerry Gebel, Vice President of Business Development at Axiomatics Modern...

TMCnet InfoTech Spotlight: Federated Identity Management and Dynamic Authorization

Feature Story
TMCnet InfoTech Spotlight: Combining Federated Identity Management with Dynamic Authorization The virtualization of nearly everything digital is pushing more and more applications, services, storage, and...

Enhancing Cloud Security for AWS Deployments

Feature Story
As organizations continue to move their IT infrastructure to AWS or other cloud providers, addressing complex access control use cases with dynamic authorization is essential....

CSO Online Feature: Securing Continuous Deployment for Applications in the Cloud

Feature Story
Container orchestration tools lack the necessary security controls but attribute based access control (ABAC) can help by Gerry Gebel Application containers have quickly gained popularity...

CSO Online Feature: When Security and Privacy Overrule Convenience

Feature Story
Organizations can enable end-to-end API security with OAuth, OpenID Connect and ABAC by Gerry Gebel for CSO Online Modern technology is constantly making our lives...

DevOps.com Feature: DevOps: Making the Development Cycle More Secure

Feature Story
By Gerry Gebel for DevOps.com Fundamentally, DevOps is all about speed and agility. Customers expect companies to deliver and update applications at an accelerated pace...

CSO Online Feature: Connecting ABAC to Identity Governance and Administration to Extend Access Control Capabilities

Feature Story
Enterprises need an approach to improve synergies between existing IAM technologies As applications, data and infrastructure continue moving into the cloud, the need for authorization...

CloudPOST Feature: Establishing a Secure Cloud Infrastructure with Dynamic Authorization

Feature Story
By David Brossard for CloudPOST Today, it is imperative for businesses to increase scalability and enable collaboration among development teams to help solve complex challenges, all...

DZone Feature: The Journey Toward Securing the Cloud

Feature Story
by Gerry Gebel for DZone.com If you are in the process of moving to the cloud or still in the planning stages, the need to...

DZone Feature: Secure Java REST APIs With JSON, XACML, and ALFA

Feature Story
How to use a JSON XACML Policy Enforcement Point to secure REST API endpoints using ALFA, XACML, and JSON. by David Brossard, for DZone In...

CSO Online Feature: Why You Need Both Authorization and Authentication

Feature Story
How to effectively manage IAM controls to secure critical assets by Gerry Gebel In previous posts I have discussed in depth the importance of authorization,...

CSO Online Feature: How important defense in depth will be as the lines between security layers blur

Feature Story
By Gerry Gebel (This article originally appeared in CSO Online.) What key roles defense in depth and layered security will play in the digital age....

CSO Online Feature: Striking a Balance between Customer Experience, Security and Privacy

Feature Story
Everyone is a consumer with Consumer Identity and Access Management (CIAM) by Gerry Gebel, for CSO Online Competitive forces and market dynamics in many industries...

CSO Online Feature: Using Dynamic Authorization to Navigate GDPR

Feature Story
With less than five months until the implementation of GDPR, organizations are scrambling to comply with the strict data security standards. by Gerry Gebel. This...

VMBlog Feature: 2018 Predictions, What’s to come in Enterprise Security

Feature Story
What’s to come in Enterprise Security by Gerry Gebel Every year enterprise security is evolving to deal with newer, more sophisticated security threats. In 2017,...

CSO Online Feature: How Enterprise Security Transformed in 2017 and What Comes Next in 2018

Feature Story
Digital transformation and microservices made up the most impactful trends for the enterprise security industry in 2017, but what will have the biggest impact in...

Axiomatics Identifies Transformative Enterprise Security Trends for 2018

Feature Story
DevSecOps, Securely Sharing Data and Regulatory Compliance Highlight the Trends to Watch for Enterprise Security in 2018 CHICAGO (December 13, 2017) – Axiomatics, the leader in...

SC Media Feature: Writing Authorization Policies to Secure Big Data

Feature Story
“Enforcing authorization directly at the data level can be incredibly powerful as it could mean minimal or no changes to the applications that are accessing...

CSO Online Feature: Managing DevOps with Dynamic Authorization

Feature Story
Security technologies, like Dynamic Authorization, are an integral part of the devops methodology and should be managed in the same manner as the application itself....

CSO Online Feature: Enhancing API Security, Dynamic Authorization to Protect Sensitive Data

Feature Story
Enhancing API Security: Dynamic Authorization to Protect Sensitive Data (September 11, 2017) Axiomatics’ Gerry Gebel featured in CSO Online API Gateways effectively manage the authentication...