+
  • Webinars

Webinars

The Convergence of Cloud, DevOps and Access Control

Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Webinars

ABAC as code – Applying Modern DevOps to Policy Authoring

A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Webinars

Taking an identity-centric approach to a modern security architecture

Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.
Webinars

Improve security, consistency and enforce access rules across applications

Enterprises can create better access control management, consistency and strong audit control.  Through the power of Attribute-based Access Control (ABAC) for externalized dynamic authorization it can tackle any business requirement. Listen to experts from Axiomatics and Radiant Logic.
Webinars

Speed, Privacy and Security – Getting to the Value of Data in Apache Spark

This webinar is a conversation between Axiomatics experts Pablo Giambiagi and Gerry Gebel, and a deep-dive into the convergence of speed, privacy and security of...
Webinars

Using Elastic Dynamic Authorization for APIs, Microservices and Data

APIs have become the backbone of many services – from the weather forecast to delivery notifications and photo printing services. Not only can we consume...
Webinars

Modern Web Application Security for “Cloud First” Initiatives

The richness of Web Access Management (WAM) is critical to your organization because it’s often the hub of access for customers, employees, third parties and...
Webinars

Open Source API Gateways and Dynamic Authorization: Working with Kong

APIs are used in almost all modern application projects and are usually tightly coupled with microservices. Securing APIs in different ways is critical and although...
Webinars

Dynamic Authorization for the Apigee API Gateway

One of the most common API gateways in the market that Axiomatics customers work with is Apigee. This gateway comes with built-in capabilities for extending...
Webinars

Controlling Access to Business-Critical Data

In this webinar, Axiomatics experts reveal how to use dynamic authorization to secure the content of data stores. Data on its own, in its own silo,...
Webinars

Using the Power of Federated Identity and Dynamic Authorization to Streamline Access Control – with Radiant Logic

Enterprises are implementing Attribute-Based Access Control (ABAC) for externalized dynamic authorization that is both policy-based for easier audit and fine-grained enough that it can tackle any...
Webinars

Authorization that Scales to the Cloud and Beyond

Companies are leveraging cloud native capabilities such as storage, orchestration, and compute to deliver value to their business; and much of net new application development...
Webinars

Beyond OAuth: Securing APIs with Policies & ABAC

Måns Håkansson gave his presentation on securing APIs with policies and Attribute Based Access Control (ABAC) at this year’s KuppingerCole Cyber Access Summit / Cybersecurity...
Webinars

5 Hidden Pitfalls of DIY Access Control Development and How to Avoid Them

Build V. Buy: Organizations that attempt to build their own access control internally often overlook or significantly underestimate the effort required to build, operate, and...
Webinars

Securing Critical Enterprise Applications and APIs with Dynamic, Risk-based Authorization and Governance

Until now, Identity Governance and Administration (IGA) and ABAC tools have largely been deployed and operated independently of each other. However, there is significant value...
Webinars

Securing APIs and Microservices with ABAC, OAuth, and OIDC

Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert to offer comprehensive...
Webinars

Authorization Made Simple: Using ALFA, REST, and JSON to Secure Applications

As more companies across all industries develop more applications, the challenge of securing those applications becomes more complex. In this webinar, Jonas Iggbom and David...
Webinars

Streamline Access Control with Federated Identity and ABAC

Enterprises are pained by legacy access control approaches. They are looking to achieve better access control management and consistency along with strong audit control and...
Webinars

SmartGuard® for Data Demo

The security risk of data stores is emerging as a threat, and data breaches will be bigger than ever – with even more data at...
Webinars

Glossary of Terms: Understanding Attribute Based Access Control

This glossary includes terms defined for architecture, services, and key phrases related to Attribute Based Access Control and the Axiomatics Product Suite.
Webinars

A Practical Approach to GDPR Requirements

At the time of this webinar, many enterprises are/were finalizing their plans for addressing new requirements of the GDPR directive. GDPR has both a business...
Webinars

Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture – Using ABAC for APIs and Microservices

As opposed to traditional monolithic applications, a (micro)service-based architecture comprises multiple loosely coupled modules (“services”) that serve specific business purposes and communicate over lightweight network...
Webinars

Webinar: Externalized Dynamic Authorization in a [Micro]Services World

Externalized Dynamic Authorization in a [Micro]Services World Key Takeaways: Enforcing authorization on the response leg to incorporate characteristics of the resources being protected Utilizing scopes...
Webinars

(Big) Data Security: Protecting Information at the Source

With the growing adoption of cloud computing, Big Data or open APIs, managing, securing and sharing massive amounts of digital data across heterogeneous and increasingly...
Webinars

Extending CA Single Sign-On with XACML Capabilities

Axiomatics CA Validated extension for CA Single Sign-On leverages Single Sign-On’s existing authorization capabilities and allows users to implement risk-intelligent policies that adapt with an...
Webinars

The Future of Data-Centric Security

Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization. The data access filtering...
Webinars

Authorization for Big Data: Introducing SmartGuard

Safeguard Information Assets with SmartGuardTM for Big Data We are seeing a strong, impressive adoption pace of Big Data systems within enterprises. Primarily driven by...
Webinars

Axiomatics Boot Camp: Testing XACML Policies Using JUnit, Eclipse, and the Abbreviated Language for Authorization (ALFA)

Experts Henrik Johansson of Knowit and David Brossard of Axiomatics provide a deep dive into testing XACML policies in this technical webinar. We start with...
Webinars

Axiomatics Back to Basics: ABAC 101

The benefits of Attribute Based Access Control (ABAC) for your organization. Attribute-Based Access Control is the most robust, flexible and fine-grained solution that is ideal for...
Webinars

Axiomatics Boot Camp: Spring Security and ABAC

To enable the use of fine-grained Attributed Based Access Control (ABAC) model within the Spring framework, Axiomatics introduced the XACML PEP SDK for Spring Security. In...
Webinars

Boot Camp: Creating a Policy Enforcement Point

Axiomatics has a new Java PEP SDK available with performance improvements. This boot camp session shares the details of the new SDK and what’s changed...
Webinars

Toxic Pairs, Role Explosion, and the Evolution of RBAC

A Practical Guide for Fine-Grained Access Control It’s 2016 and the days of Sherlock Holmes are long gone. Yet mysteries and puzzles abound more than...
Webinars

Proving Compliance throughout the ABAC Lifecycle

One of the benefits of Attribute Based Access Control is the ability to fine-tune compliance checks and balances in real time, and make changes to...
Webinars

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

A Webinar with Axiomatics and IAM Analysts KuppingerCole: Take me to recording Join Axiomatics and leading analyst firm KuppingerCole to learn more about Attribute Based Access Control...
Webinars

The CISO’s Guide to Planning for ABAC Success – with Guest Speakers from Security Architects Partners

A webinar with Axiomatics and Security Architects Partners Axiomatics and Security Architects Partners present this session on the components for a successful transition from legacy access...
Webinars

Delivering Fine-Grained Authorization Today by Leveraging a Federated Identity Service and ABAC

A webinar with Axiomatics and Radiant Logic A recent Gartner report predicts that by 2020, 70% of organizations will use Attribute-Based Access Control (ABAC) to...
Webinars

How Top Banks Use an Attribute-Based Approach (ABAC) to Protect PII, Critical Assets, and Meet Regulations

Find out why Attribute Based Access Control is the solution for the world’s leading banks and financial institutions. As demands for better online services– from...
Webinars

Healing Data Leakage in the Modern Health Care Environment

The move to electronic records (EHR) in the health care industry – across providers, insurance companies and a multitude of third parties – has increased...
Webinars

Axiomatics Boot Camp: ABAC and XACML Made Easy – Using ALFA to Write Fine-Grained Authorization Policies

Does the promise of attribute-based access control sound like magic? Don’t worry, you don’t need to be a wizard to write efficient and secure ABAC...
Webinars

Building Love and Compatibility between RBAC and ABAC

As legacy data access control models such as Role Based Access Control begin to break down, industries are moving to the next generation of access...
Webinars

Joint webinar with Axway – Protecting Your Data Beyond the Enterprise with Fine Grained Access Control for APIs and Data

Please join Axiomatics and Mark O’Neill, VP of Innovation at Axway, as we discuss the role that fine grained access control plays in securing APIs...
Webinars

New Years Detox – Eliminating Toxic Combinations in your Access Control

As access control has become more complex, the assignment of roles has exploded out of control, making it harder to eliminate toxic combinations of roles...
Webinars

Axiomatics Boot Camp – Database Filtering and Policy Creation

Data Access Filtering is the ability to apply access policies to database requests to ensure that only authorized individuals are allowed to read and write...
Webinars

Centralizing the Code – Separating Authorization Logic from Apps

For any business in the Fortune 1000 – such as health care, insurance, banking, pharmaceuticals and manufacturing – the need to shift beyond legacy role-based...
Webinars

XACML Experts Panel Discussion

Everything you ever wanted to know about XACML but were afraid to ask. This panel discussion features our three top experts for the XACML language. Gerry...
Webinars

API Authorization – Secure Sensitive Data with Attribute Based Access Control

In this session we have invited a very special guest speaker, Anderson Gray from CA Technologies for a look at the growth of APIs, trends,...
Webinars

Axiomatics Boot Camp 101 – Filter Sensitive Data at the Database Layer and Keep it Secure

With so much rich, valuable data stored in databases, they are constantly targeted and too often breached. By dynamically filtering and masking data at the...
Webinars

From Static Roles to Dynamic Attribute-Based Authorization

This is a joint webinar together with analyst firm KuppingerCole. The webinar is hosted on KuppingerCole’s website.  Dynamic authorisation systems complement or replace the rigid...
Webinars

Axiomatics Bootcamp 201 – Using JSON and REST Profiles for External Authorization

JSON and REST are widely used to implement lightweight and fast web services. This Axiomatics Boot Camp session will provide technical insight into using these...
Webinars

Axiomatics Bootcamp ABAC 101

This “bootcamp” style webinar provides a basic overview of Attribute Based Access Control (ABAC) and how it helps solve complex data access control challenges. Enterprises...
Webinars

Beyond Database Security

This is a joint webinar together with analyst firm KuppingerCole. Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In...
Webinars

Enhancing Spring Security

Spring Security provides authentication, basic authorization and other security features for the widely used Java application framework Spring and it is a popular choice for...
Webinars

Overcoming Role Explosion Challenges with Attribute-Based Access Control

Access control has been predominantly managed with a legacy static model based on user roles – called “Role-based Access Control“, or RBAC. Enterprises that use...
Webinars

Cutting through export control with Bell helicopter and Axiomatics

In this webinar, together with guest speaker Greg Heartsfield from Bell Helicopter, we will focus on the complexity of export control and PLM systems and...
Webinars

Enabling ABAC on APIs

Axiomatics attended the annual partner and customer conference Axway Connections at the prestigious Silverstone F1 circuit in Northamptonshire. Our VP of Customer Relations, David Brossard, held...
Webinars

Access Control Obstacles – How to Win the Challenge of IT vs. Business Units

Attribute Based Access Control (ABAC) may be the future of identity and access management (just ask analysts Gartner and KuppingerCole) but up until now there...
Webinars

Using the OWASP Top Ten to Upgrade Your Authorization Services

This is an exiting webinar on how the OWASP Top Ten can help you upgrade your authorization services. Our Americas President, and resident Attribute-based Access...
Webinars

The #1 New Year’s Resolution: Lock Down Your Data Access

High profile data leaks are in the news almost daily – sensitive data is being accessed, released to the public, or stolen by identity thieves....
Webinars

Securing Data Is a Four Letter Word

It seems that every morning we wake up to news of yet another high profile data leak. Sensitive or business critical information has been improperly...
Webinars

Building an Effective API Security Framework Using ABAC

Today, information is shared like never before. Whether it’s for business or private purposes, people expect information to be readily available. APIs are a great...
Webinars

The ABAC Advantage According to NIST – What the Guidelines and the Users Have to Say

In this webinar we will discuss the ABAC advantage according to the National Institute for Standards and Technology (NIST).
Webinars

Attribute Based Access Control (ABAC) Authorizing Data Access

This is a joint webinar together with our partner First Point Global. In this webinar we will demonstrate how dynamic authorisation supports innovation in the...
Webinars

Dynamic Access Control for Insurance Companies

In this webinar we will investigate in more detail why and how companies are adopting Attribute Based Access Control (ABAC) and learn more about the...
Webinars

Protect Sensitive Data(bases): Enforce Compliance at Any Access Point

In the past, protection of sensitive data has revolved around a patchwork of complementary methods and technologies. Transparency is compromised as complexity increases and the...
Webinars

Get Started Now! Achieving Attribute Based Access Control (ABAC) for Applications with XACML

The Axiomatics Policy Server delivers dynamic, fine-grained authorization for applications. It enables organizations to enforce corporate policies throughout an entire organization based on multiple attributes...
Webinars

Do You Have a Business Case for Attribute Based Access Control (ABAC)?

Gartner recently predicted that “by 2020, 70 % of enterprises will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up...
Webinars

Enabling New Business Opportunities While Balancing Risks in the Financial Services Industry

If IT empowers users to take on risks beyond corporate policy limits, the bank may have to pick up the bill. This is the reason...
Webinars

Privacy Regulations – a Complex Authorization Challenge for Today’s Organizations

Efficient processing and sharing of information is essential in every organization. However, security often fails. This typically leads to either of two scenarios: Data is...
Webinars

Applying Fine-Grained Authorization to Java MVC Applications with XACML

N-tier applications can be challenging from a security perspective. Security policies impact the user interface as well as the business layer and even the data...
Webinars

Tutorial: A Beginner’s Guide to XACML (Part 2) Getting Started with ALFA

The ALFA Plugin for Eclipse is a tool that converts your Eclipse programming IDE to a dedicated editor of authorization policies using ALFA syntax. ALFA...
Webinars

Tutorial: A Beginner’s Guide to XACML (Part 1)

In part one of our “Tutorial: A Beginner’s Guide to XACML (Part 1) we take a look at attribute-based access control (ABAC) and how it...