• White Papers

White Papers

Top 10 Misconceptions of a Policy-Based Approach

Even for senior software developers, wading into the world of IAM (Identity & Access Management) and access control can be daunting. Making your way through the...
White Papers

Infographic: Build vs. Buy for Dynamic Authorization Solutions

When making a Build vs Buy decision for IAM and dynamic authorization, you must take into account the hidden costs of DIY. In this infographic,...
White Papers

Build vs Buy for Dynamic Authorization Solutions

When should you consider investing in Dynamic Authorization software versus building your own in-house solution? When evaluating the best approach to securing your APIs, applications,...
White Papers

Technical Viewpoint: Protecting Microservices and APIs with ABAC, OAuth, and OpenID Connect

Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert to offer comprehensive...
White Papers

Empower the New Identity Architecture: Combine a Federated Identity Service with Attribute Based Access Control (ABAC)

In today’s complex identity infrastructures, flexibility has become an essential requirement. The rise of cloud-based platforms, SaaS applications along with other industry trends such as...
White Papers

EY Digital Identity and Access Management Report

As organizations shift business strategies towards new digital channels to maintain a competitive advantage, and consumers become increasingly reliant on multiple device connections, cybersecurity threats...
White Papers

5 Fast Facts for API Access Control

APIs have become the defacto method for connecting people with data. This is great news for users: access is much smoother and often instantaneous. But...
White Papers

The State of Data Centric Security

Data-centric security signifies a new generation of database security techniques, based on a combination of robust and proven technologies: contextual data filtering, dynamic data masking...
White Papers

Solving New Collaboration, Security, Cloud and Mobilization Challenges in the Energy Sector

Discover how companies in the power and utilities sectors can use attribute based access control to safeguard and securely share sensitive data within their ecosystems.
White Papers

What is Attribute Based Access Control?

Protect Critical Assets and Enable Information Sharing What is Attribute Based Access Control? Access control has gone beyond simply need-to-know to include need-to-share authorization. Traditionally,...
White Papers

How ABAC fits into an IAM Framework

IAM teams are finding that Attribute Based Access Control is key to meeting regulatory and compliance requirements. ABAC is an access control approach that is...
White Papers

The Basics of Attribute Based Access Control (ABAC)

Traditionally, the focus of authorization and access control has been on building barriers to sensitive data and only making it available to a select few....
White Papers

Data-centric Security for Pharmaceuticals – Executive Summary

Providing the right stakeholders with unobstructed access to sensitive data is essential in any industry. Within the pharmaceutical and biotech industries, inefficient data sharing and collaboration slow...
White Papers

Axiomatics Primer: OAuth and OpenID Connect

Learn how to approach applying Externalized Dynamic Authorization to an API and/or microservices architecture that uses OAuth 2.0 flows and/or OpenID Connect (OIDC), with this...
White Papers

Why Externalized Authorization? (for Federal Government)

“What will my organization gain from externalized authorization?” It’s a question our team hears often. Axiomatics understands our dynamic world that requires organizations to be more...
White Papers

Why You Should Externalize Your Authorization

“What will my organization gain from externalized authorization?” “Will our performance suffer?” “My team enjoys the challenge of writing their own code.” Axiomatics understands our dynamic...
White Papers

Federal Government: How ABAC fits into an IAM Framework

IAM teams in the federal government are finding that Attribute Based Access Control is key to meeting regulatory and compliance requirements. ABAC is an access...
White Papers

The Evolution of RBAC Models to Next-Generation ABAC

The management and administration of roles to set permission for access control have become challenging for enterprises of all sizes. In this whitepaper, you’ll learn...
White Papers

Making a Business Case for Attribute Based Access Control (ABAC)

Cut Costs, Streamline Access Control and Achieve Compliance. Are you looking to shift your access control approach to handle today’s complex IT environment? Or maybe...
White Papers

Axiomatics Data Access Filter – Next Generation Data-Centric Security

This whitepaper introduces the Axiomatics Data Access Filter product family. The data access filtering approach represents a new generation of database security techniques, based on a combination...
White Papers

Getting the OWASP Top Ten Right with Dynamic Authorization

The non-stop drum beat of data breaches and non-stop security issues show that a new approach to security is required writ large. Application security can...
White Papers

Meeting Health Care Privacy Regulations with Attribute Based Access Control

Personally Identifiable Information (PII) with related sensitive health care data is increasingly being maintained in electronic records. This means PII data can be made available,...
White Papers

The Identity & Access Management (R)evolution

Ready to evolve your access control to meet new complexities? Many organizations are currently striving to develop new strategies in their IAM vision and roadmap...
White Papers

Shifting to Attribute Based Access Control

No longer is a company’s data restricted by the boundaries imposed by physical office space and a local area network. Data sharing and collaboration transcend...
White Papers

Adding Fine-Grained Authorization to CA Single Sign-On

The Axiomatics Extension for CA Single Sign-On uses the Authorization API to seamlessly insert XACML capabilities into the product to add fine-grained authorization capabilities. Read...
White Papers

Increasing the Value of Information with Fine Grained Security for Data Marts

Knowledge intensive industries, such as Pharma, Banking, Insurance, Media and Energy, increasingly rely upon timely access to integrated information for innovation and product development, as...
White Papers

Getting Started With Attribute Based Access Control

Implementation of an Attribute Based Access Control (ABAC) system is accomplished by the completion of three main task groups: Policy Modeling Attribute Sourcing Application Integration By...
White Papers

Enforcing Segregation of Duties

About Enforcing Segregation of Duties White Paper IT organizations have struggled to identify potential Segregation of Duties (SoD) violations within their IT systems. A violation...
White Papers

The Key to API Security

This solution brief is an overview on how Attribute-Based Access Control (ABAC) brings security and agility to the API infrastructure. APIs have revolutionized the way...