• Case Studies

Case Studies

Efficient Enterprise-Wide Risk Management and Secure Collaboration Using ABAC

A major US automotive manufacturer was faced with a consolidation challenge for their authorization. As with many large enterprises, security authorization had historically been handled...
Case Studies

Granular Access Control for a Complex Business Model

Modernizing Access Control in a B2B2C Organization with Dynamic Authorization The Company needed to securely share data throughout the complex delivery layers of a “B2B2C”...
Case Studies

Get to the Cloud Faster, and More Securely

As enterprises continue to migrate applications, services and workloads to the cloud, they are addressing the challenge of how to protect resources in an open,...
Case Studies

Federal Mission: Applying ABAC to Your Cloud Migration

This Use Case, Federal Mission: Applying ABAC to Your Cloud Migration, is tailored for government agencies, who have some of the most burdensome security requirements....
Case Studies

European Bank Achieves Proactive Data Security, Compliance with ABAC

Executive Summary The primary driver for this project was to achieve compliance with a Personal Data Protection Law and to prepare for future regulatory challenges....
Case Studies

Fortune 500 Transportation Company Simplifies Access Control for 175,000 Users

One of the largest freight transportation companies in the world, with over 50,000 employees, stores and manages data with access in mind for over 175,000...
Case Studies

Security Compliance Using Externalized Authorization

Central Decision Point for Fine-grained Access Control: Entitlements Management To effectively comply with various industry regulations, businesses require integrated, cost-effective information risk management solutions that...
Case Studies

Federal Mission: Security Compliance using Externalized Authorization Management (EAM)

United States federal agencies are beholden to myriad regulations and standards, some of the most notable of which are the FIPS Publication 200 and the...
Case Studies

Federal Mission: Dissemination and Information Sharing using ABAC

Law enforcement, defense, and intelligence agencies are under the obligation to securely share as much information as possible within their respective communities. The keyword here...
Case Studies

Federal Government: Insider Threat Use Case

U.S. federal government agencies hold information that, if released from control, could do grave harm to the country and its citizens. This information includes Personally...
Case Studies

Bell: Cutting through the Code to Meet Export Control Regulations

When Bell realized the scale required to develop an in-house access control system to manage strict export regulations, the decision was made to look externally,...
Case Studies

Federal Government: Cross-domain ABAC Use Case

Agencies look to Cross Domain Solutions (CDS) to transfer information between these domains in a way that ensures the timely sharing of information while still...
Case Studies

Danish Defence – A Secure Solution for Sharing Information Electronically

A joint project with Axway, Axiomatics and Sopra Steria, this case study outlines the Danish Defence project. A secure solution forexposing APIs to send and receive information...
Case Studies

Attribute Based Access Control for Manufacturing

Attribute Based Access Control for Manufacturing Manufacturers around the globe are faced with the growing risk of breaches – in many cases the attackers are...
Case Studies

Patient Data Privacy for eHealth Services

The Center for eHealth in Sweden coordinates the efforts of county councils and regions in the establishment of national eHealth services. Within this framework, the...
Case Studies

CSS Insurance – Onboarding New Authorization Tasks

Having tested various solutions to resolve authorization issues with their corporate document management system, CSS Insurance turned to the Axiomatics Policy Server (APS) to deliver...
Case Studies

Swiss Re – User Permisson Management

The insurance sector is highly regulated. Sensitive information must be protected in compliance with regulations, with as little impact on business as possible. At the...
Case Studies

Cross Border Privacy Enforcement – Global Financial Services and the Data Flow Challenge

Privacy regulations impact cross-border transactions in the financial services industry. Domestic processing of personally identifiable information (PII) and the transfer thereof for storage or processing...