Axiomatics is the leading provider of dynamic authorization solutions for applications, databases, Big Data, APIs and microservices. Our solutions help enterprises and government agencies balance the need to protect their most critical assets with the need to share information, using a context-based access control approach. Learn more about who we are and what we do. 

Download

Name Description Type Released Industry Featured
Name Description Type Released Industry Featured

The Future of Data-Centric Security

Type: Webinar
  Click here to view recording Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization. The data... Webinar 2016-11-02

The Key to API Security

Type: Case Study
This solution brief is an overview on how Attribute-Based Access Control (ABAC) brings security and agility to the API infrastructure. Case Study 2015-07-21

Case Study: Danish Defence - Providing a Secure Solution for Sharing Information Electronically

Type: Case Study
A joint project with Axway, Axiomatics and Sopra Steria, this case study outlines the Danish Defence project. A secure solution forexposing APIs to send and receive information between... Case Study 2016-09-07

Axiomatics Capabilities Brochure

Type: Product Sheet
This brochure provides a full overview on Axiomatics and our dynamic authorization product suite. It features the capabilities of our products to solve your most complex authorization challenges.... Product Sheet 2016-12-15

Axiomatics Review Manager

Type: Data Sheet
This data sheet focuses on the Axiomatics Review Manager. Data Sheet 2016-04-19

SmartGuard(TM) for Big Data - Data Sheet

Type: Data Sheet
SmartGuardTM for Big Data from Axiomatics is the only Big Data authorization solution that supports the full capability and delivers the true flexibility of Attribute Based Access Control (ABAC). It... Data Sheet 2016-11-03

Cross Border Privacy Enforcement - Global Financial Services and the Data Flow Challenge

Type: Case Study
Privacy regulations impact cross-border transactions in the financial services industry. Domestic processing of personally identifiable information (PII) and the transfer thereof for storage or... Case Study 2015-07-21

Axiomatics Primer: OAuth and OpenID Connect

Type: White Paper
Learn how to approach applying Externalized Dynamic Authorization to an API and/or microservices architecture that uses OAuth 2.0 flows and/or OpenID Connect (OIDC), with this Axiomatics Primer on... White Paper 2016-12-05

Kuppinger Cole Leadership Compass 2014

Type: Report
Report 2015-11-16

SmartGuard(TM) for Big Data - Product Sheet

Type: Product Sheet
SmartGuardTM for Big Data from Axiomatics is the only Big Data authorization solution that supports the full capability and delivers the true flexibility of Attribute Based Access Control (ABAC). It... Product Sheet 2016-11-03

Axiomatics Policy Auditor 1.1

Type: Data Sheet
This data sheet focuses on the Axiomatics Policy Auditor (APA) version 1.1. Data Sheet 2015-11-16

Axiomatics Boot Camp: Testing XACML Policies Using JUnit, Eclipse, and the Abbreviated Language for Authorization (ALFA)

Type: Webinar
Experts Henrik Johansson of Knowit and David Brossard of Axiomatics provide a deep dive into testing XACML policies in this technical webinar. We start with the authorization lifecycle and how it... Webinar 2016-09-01

Bell Helicopter - Cutting through the Code to Meet Export Control Regulations

Type: Case Study
When Bell Helicopter realized the scale required to develop an in-house role-based access control system to manage strict export regulations, the decision was made to look externally, and enlist a... Case Study 2015-07-21

ABAC for Pharmaceuticals - Executive Summary

Type: White Paper
Providing the right stakeholders with unobstructed access to sensitive data is essential in any industry. Within the pharmaceutical and biotech industries, inefficient data sharing and... White Paper 2016-10-28

Vital Authorization Add-ons - Reporting, auditing and access review for Axiomatics Policy Server and Data Access Filter

Type: Product Sheet
This product sheet highlights the reporting, auditing and access review add-ons we provide. Product Sheet 2016-04-19

Axiomatics Data Access Filter MD

Type: Data Sheet
This data sheet focuses on the Axiomatics Data Access Filter for Multiple Databases (ADAF MD). Data Sheet 2015-11-16

Manufacturing Use Case for ABAC

Type: Industry Brief
Manufacturers around the globe are faced with the growing risk of breaches - in many cases the attackers are after IP and sensitive customer data. Using an Attribute Based Access Control approach... Industry Brief 2016-06-08

Axiomatics Back to Basics: ABAC 101

Type: Webinar
  The benefits of Attribute Based Access Control (ABAC) for your organization.   Attribute Based Access Control is the most robust, flexible and fine-grained solution that is... Webinar 2016-08-22

Swiss Re - User Permisson Management

Type: Case Study
The insurance sector is highly regulated. Sensitive information must be protected in compliance with regulations, with as little impact on business as possible. At the same time compliance with... Case Study 2015-07-21

How ABAC fits into an IAM Framework

Type: White Paper
IAM teams are finding that Attribute Based Access Control is key to meeting regulatory and compliance requirements. ABAC is an access control approach that is recommended by NIST and discussed in... White Paper 2016-08-08

Axiomatics Review Manager

Type: Product Sheet
This product sheet focuses on the Axiomatics Review Manager. Product Sheet 2016-04-19

Energy & Utilities Industry Brief

Type: Industry Brief
Discover how companies in the energy and utility sectors can use attribute based access control to safeguard and securely share sensitive data within their ecosystems. Download Industry... Industry Brief 2016-09-26

Axiomatics Boot Camp: Spring Security and ABAC

Type: Webinar
To enable the use of fine-grained Attributed Based Access Control (ABAC) model within the Spring framework, Axiomatics introduced the XACML PEP SDK for Spring Security.   In this refresher... Webinar 2016-07-13

CSS Insurance - Onboarding New Authorization Tasks

Type: Case Study
Having tested various solutions to resolve authorization issues with their corporate document management system, CSS Insurance turned to the Axiomatics Policy Server (APS) to deliver effective... Case Study 2015-07-21

Federal Government: How ABAC fits into an IAM Framework

Type: White Paper
IAM teams in the federal government are finding that Attribute Based Access Control is key to meeting regulatory and compliance requirements. ABAC is an access control approach that is recommended... White Paper 2016-08-05

Axiomatics Extension for CA Single Sign-On

Type: Product Sheet
This product sheet explains how the Axiomatics Extension for CA Single Sign-On delivers dynamic authorization for web access management by enforcing user permissions based... Product Sheet 2015-11-16

Boot Camp: Creating a Policy Enforcement Point

Type: Webinar
Axiomatics has a new Java PEP SDK available with performance improvements. This boot camp session will share the details of the new SDK and what's changed in the latest version. In addition we'll... Webinar 2016-06-03

eHealth

Type: Case Study
The Center for eHealth in Sweden coordinates the efforts of county councils and regions in the establishment of national eHealth services. Case Study 2015-07-21

Axiomatics Data Access Filter MD

Type: Product Sheet
The Axiomatics Data Access Filter applies access policies to database requests, thereby ensuring that only authorized individuals are allowed to read and write data, and to further protect this data... Product Sheet 2015-11-16

Safe Harbor: The New Privacy Challenges

Type: Industry Brief
Now that Safe Harbor agreement has been deemed invalid global organizations with employees and customers in Europe face new data privacy challenges. To meet compliance and cope with ongoing... Industry Brief 2015-12-01

Toxic Pairs, Role Explosion, and the Evolution of RBAC

Type: Webinar
A Practical Guide for Fine-Grained Access Control It's 2016 and the days of Sherlock Holmes are long gone. Yet mysteries and puzzles abound more than ever in our increasingly complex world. IT is... Webinar 2016-05-25

Financial Services

Type: Case Study
Protect access to sensitive information and secure transactions without sacrificing business agility. Case Study 2015-07-21

Axiomatics Integration for CA API Gateway

Type: Product Sheet
This product sheet explains how the Axiomatics Integration for CA API Gateway enhances the CA API Gateway security with attribute based access control. Product Sheet 2015-11-16

Proving Compliance throughout the ABAC Lifecycle

Type: Webinar
One of the benefits of Attribute Based Access Control is the ability to fine-tune compliance checks and balances in real time, and make changes to policies to meet compliance in an immediate,... Webinar 2016-05-11

Manufacturing

Type: Case Study
Global industries depend on information sharing across the borders of nations and jurisdictions. Intellectual properties are at stake and export control compliance is non-negotionable. An obvious... Case Study 2015-07-21

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

Type: Webinar
A webinar with Axiomatics and IAM analysts KuppingerCole Take me to recording Join Axiomatics and leading analyst firm KuppingerCole to learn more about Attribute Based Access Control... Webinar 2016-04-29

Insurance Industry Brief

Type: Case Study
Insurance companies go to market via agents and agents of agents. Clients expect efficient and secure online services. Authorities demand strict regulatory compliance. Attribute Based Access Control... Case Study 2015-07-21

Axiomatics Policy Server

Type: Product Sheet
This product sheet focuses on Axiomatics Policy Server (APS), the most complete solution available for enterprise-wide roll out of Attribute Based Access Control (ABAC). Product Sheet 2015-11-16

The CISO's Guide to Planning for ABAC Success - with Guest Speakers from Security Architects Partners

Type: Webinar
A webinar with Axiomatics and Security Architects Partners Axiomatics and Security Architects Partners present this session on the components for a successful transition from legacy access... Webinar 2016-04-13

Getting the OWASP Top Ten Right with Dynamic Authorization

Type: White Paper
The non-stop drum beat of data breaches and non-stop security issues show that a new approach to security is required writ large. Application security can be improved through fine-grained, dynamic... White Paper 2015-07-21

Meeting Health Care Privacy Regulations with Attribute Based Access Control

Type: White Paper
Personally Identifiable Information (PII) with related sensitive health care data is increasingly being maintained in electronic records. This means PII data can be made available, reproduced and... White Paper 2015-07-21

How Top Banks Use an Attribute-Based Approach (ABAC) to Protect PII, Critical Assets, and Meet Regulations

Type: Webinar
Find out why Attribute Based Access Control is the solution for the world’s leading banks and financial institutions. As demands for better online services– from customers, staff and... Webinar 2016-04-08

Enabling ABAC on APIs

Type: Tutorial
Axiomatics attended the annual partner and customer conference Axway Connections at the prestigious Silverstone F1 circuit in Northamptonshire. Our VP of Customer Relations, David Brossard,... Tutorial 2015-04-07

The Identity & Access Management (R)evolution

Type: White Paper
Ready to evolve your access control to meet new complexities? Many organizations are currently striving to develop new strategies in their IAM vision and roadmap planning. While investments that are... White Paper 2015-07-21

Healing Data Leakage in the Modern Health Care Environment

Type: Webinar
The move to electronic records (EHR) in the health care industry - across providers, insurance companies and a multitude of third parties - has increased the speed of sharing records, and in theory,... Webinar 2016-03-03

Shifting to Attribute Based Access Control

Type: White Paper
No longer is a company’s data restricted by the boundaries imposed by physical office space and a local area network. Data sharing and collaboration transcend organizational borders and older... White Paper 2015-07-21

Axiomatics Boot Camp: ABAC and XACML Made Easy - Using ALFA to Write Fine-Grained Authorization Policies

Type: Webinar
Does the promise of attribute-based access control sound like magic? Don't worry, you don't need to be a wizard to write efficient and secure ABAC policies. In this bootcamp webinar, we will show... Webinar 2016-02-26

Adding Fine-Grained Authorization to CA Single Sign-On

Type: White Paper
The Axiomatics Extension for CA Single Sign-On uses the Authorization API to seamlessly insert XACML capabilities into the product to add fine-grained authorization capabilities. Read more about how... White Paper 2015-07-21

Building Love and Compatibility between RBAC and ABAC

Type: Webinar
As legacy data access control models such as Role Based Access Control begin to break down, industries are moving to the next generation of Attribute Based Access Control. Some experts say these two... Webinar 2016-02-15

Increasing the Value of Information with Fine Grained Security for Data Marts

Type: White Paper
Knowledge intensive industries, such as Pharma, Banking, Insurance, Media and Energy, increasingly rely upon timely access to integrated information for innovation and product development, as well... White Paper 2015-07-21

Joint webinar with Axway - Protecting Your Data Beyond the Enterprise with Fine Grained Access Control for APIs and Data

Type: Webinar
Please join Axiomatics and Mark O’Neill, VP of Innovation at Axway, as we discuss the role that fine grained access control plays in securing APIs and the data that flows through them. We will... Webinar 2016-02-08

Getting Started With Attribute Based Access Control

Type: White Paper
Implementation of an Attribute Based Access Control (ABAC) system is accomplished by the completion of three main task groups: policy modeling attribute... White Paper 2015-07-21

New Years Detox - Eliminating Toxic Combinations in your Access Control

Type: Webinar
As access control has become more complex, the assignment of roles has exploded out of control, making it harder to eliminate toxic combinations of roles that end up allowing access that should... Webinar 2016-01-15

Axiomatics Boot Camp - Database Filtering and Policy Creation

Type: Webinar
Data Access Filtering is the ability to apply access policies to database requests to ensure that only authorized individuals are allowed to read and write data, and to further protect this data by... Webinar 2015-12-18

Enforcing Segregation of Duties

Type: White Paper
IT organizations have struggled to identify potential Segregation of Duties (SoD) violations within their IT systems. A violation of this kind occurs if a user is given permissions which combined... White Paper 2015-07-21

Centralizing the Code - Separating Authorization Logic from Apps

Type: Webinar
For any business in the Fortune 1000 - such as health care, insurance, banking, pharmaceuticals and manufacturing - the need to shift beyond legacy role-based access control models becomes more... Webinar 2015-12-09

Axiomatics Boot Camp - Managing Multiple Projects for Policy Authoring and Deployment

Type: Webinar
When using an Attribute Based Access Control approach, Enterprises have varying requirements for segregation of an access control policy authoring and deployment architecture. These typically... Webinar 2015-11-27

XACML Experts Panel Discussion

Type: Webinar
Everything you ever wanted to know about XACML but were afraid to ask. This panel discussion features our three top experts for the XACML language. Webinar 2015-11-12

API Authorization – Secure Sensitive Data with Attribute Based Access Control

Type: Webinar
In this session we have invited a very special guest speaker, Anderson Gray from CA Technologies for a look at the growth of APIs, trends, the use of API gateways and the need for more fine-grained... Webinar 2015-10-01

Axiomatics Boot Camp 101 - Filter Sensitive Data at the Database Layer and Keep it Secure

Type: Webinar
With so much rich, valuable data stored in databases, they are constantly targeted and too often breached. By dynamically filtering and masking data at the row, column and cell level, enterprises... Webinar 2015-09-25

From Static Roles to Dynamic Attribute-Based Authorization

Type: Webinar
This is a joint webinar together with analystfirm KuppingerCole. Webinar 2015-09-15

Axiomatics Bootcamp 201 - Using JSON and REST Profiles for External Authorization

Type: Webinar
JSON and REST are widely used to implement lightweight and fast web services. This Axiomatics Boot Camp session will provide technical insight into using these XACML profiles for externalized... Webinar 2015-08-26

Beyond Database Security

Type: Webinar
This is a joint webinar together with analyst firm KuppingerCole. Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar... Webinar 2015-06-23

Axiomatics Bootcamp ABAC 101

Type: Webinar
This "bootcamp" style webinar provides a basic overview of Attribute Based Access Control (ABAC) and how it helps solve complex data access control challenges. Enterprises and government agencies... Webinar 2015-07-01

Enhancing Spring Security

Type: Webinar
Spring Security provides authentication, basic authorization and other security features for the widely used Java application framework Spring and it is a popular choice for use in the development... Webinar 2015-05-29

Tutorial: A Beginner's Guide to XACML (Part 1)

Type: Tutorial
In part one of our XACML beginners tutorials we take a look at attribute based access control (ABAC) and how it can be applied in a typical scenario whereby sensitive records, namely purchase... Tutorial 2012-08-22

Overcoming Role Explosion Challenges with Attribute-Based Access Control

Type: Webinar
Access control has been predominantly managed with a legacy static model based on user roles - called "Role-based Access Control", or RBAC. Enterprises that use RBAC are now experiencing role... Webinar 2015-05-14

Tutorial: A Beginner's Guide to XACML (Part 2) Getting Started with ALFA

Type: Tutorial
The ALFA Plugin for Eclipse is a tool that converts your Eclipse programming IDE to a dedicated editor of authorization policies using ALFA syntax. ALFA policies can then easily be converted into... Tutorial 2012-08-22

Export Control with Bell Helicopter and Axiomatics

Type: Webinar
In this webinar, together with guest speaker Greg Heartsfield from Bell Helicopter, we will focus on the complexity of export control and PLM systems and the challenge of overseeing data... Webinar 2015-04-22

Flexible and Dynamic Security for the Data-Centric Enterprise

Type: Webinar
Requirements for securing data often pass down from C-level executives through multiple layers: from security architects out to the teams and systems administrators responsible for implementing... Webinar 2015-04-09

Access Control Obstacles - How to Win the Challenge of IT vs. Business Units

Type: Webinar
Attribute Based Access Control (ABAC) may be the future of identity and access management (just ask analysts Gartner and KuppingerCole) but up until now there have been certain obstacles. In the... Webinar 2015-03-12

Using the OWASP Top Ten to Upgrade Your Authorization Services

Type: Webinar
This is an exiting webinar on how the OWASP Top Ten can help you upgrade your authorization services. Our Americas President, and resident Attribute-based Access Control (ABAC) expert, Gerry... Webinar 2015-02-10

The #1 New Year's Resolution: Lock Down Your Data Access

Type: Webinar
High profile data leaks are in the news almost daily – sensitive data is being accessed, released to the public, or stolen by identity thieves. Keeping sensitive data secure often seems like... Webinar 2015-01-15

Securing Data Is a Four Letter Word

Type: Webinar
It seems that every morning we wake up to news of yet another high profile data leak. Sensitive or business critical information has been improperly accessed, released to the public, or stolen by... Webinar 2014-12-12

Protect Your Business Applications and APIs with Externalized Authorization

Type: Webinar
Modern infrastructures offer countless and ever increasing data access points. Managing their protection is often a difficult and time consuming task. Externalized authorization is therefore... Webinar 2013-11-04

ABAC: Ready, Steady, Go!

Type: Webinar
Is authorization an issue for your organization? Are current static access control methods in use, exposing your company to unnecessary risk? If so, it's time to exchange RBAC for ABAC and... Webinar 2014-10-30

Building an Effective API Security Framework Using ABAC

Type: Webinar
Today, information is shared like never before. Whether it’s for business or private purposes, people expect information to be readily available. APIs are a great way of achieving this, but it... Webinar 2014-10-16

The ABAC Advantage According to NIST – What the Guidelines and the Users Have to Say

Type: Webinar
In this webinar we will discuss the ABAC advantage according to the National Institute for Standards and Technology (NIST). Webinar 2014-10-01

Attribute Based Access Control (ABAC) Authorizing Data Access

Type: Webinar
This is a joint webinar together with our partner First Point Global. In this webinar we will demonstrate how dynamic authorisation supports innovation in the digital economy Webinar 2014-08-06

Dynamic Access Control for Insurance Companies

Type: Webinar
In this webinar we will investigate in more detail why and how companies are adopting Attribute Based Access Control (ABAC) and learn more about the key benefits. Webinar 2014-06-17

XACML Meets SQL - ARQ 2.0 Just the Cure for Secure Data Sharing

Type: Webinar
Axiomatics' unique reverse query technology enables users to achieve fine-grained access control for large data sets in a single batch. In this webinar we present the Axiomatics Reverse Query (ARQ)... Webinar 2012-08-22

Extending CA Single Sign-On with XACML Capabilities

Type: Webinar
Axiomatics CA Validated extension for CA Single Sign-On leverages Single Sign-On’s existing authorization capabilities and allows users to implement risk-intelligent policies that adapt with... Webinar 2012-08-22

Creating an Authorization Infrastructure with APS 5.0

Type: Webinar
This webinar from 2012 introduces the Axiomatics Policy Server 5.0 and highlights Axiomatics' Language for Authorization (ALFA) including the Eclipse plugin which Axiomatics now provides for free. Webinar 2012-09-18

Any Depth Security with ABAC. A Case Study from the Insurance Industry

Type: Webinar
In this webinar, Head of IT Security and Identity Management at CSS Insurance, Sebastian Goodrick, shares his experiences with Attribute Based Access Control (ABAC) solutions, including how APS has... Webinar 2012-08-22

Protect Sensitive Data(bases): Enforce Compliance at Any Access Point

Type: Webinar
In the past, protection of sensitive data has revolved around a patchwork of complementary methods and technologies. Transparency is compromised as complexity increases and the overall solution... Webinar 2014-05-09

Privacy Regulations - a Complex Authorization Challenge for Today's Organizations

Type: Webinar
Efficient processing and sharing of information is essential in every organization. However, security often fails. This typically leads to either of two scenarios: Data is locked away rather than... Webinar 2013-11-21

Get Started Now! Achieving Attribute Based Access Control (ABAC) for Applications with XACML

Type: Webinar
The Axiomatics Policy Server delivers dynamic, fine-grained authorization for applications. It enables organizations to enforce corporate policies throughout an entire organization based on multiple... Webinar 2014-04-11

Enabling New Business Opportunities While Balancing Risks in the Financial Services Industry

Type: Webinar
If IT empowers users to take on risks beyond corporate policy limits, the bank may have to pick up the bill. This is the reason multi-factor authorization is becoming increasingly popular in the... Webinar 2013-12-05

Do You Have a Business Case for Attribute Based Access Control (ABAC)?

Type: Webinar
Gartner recently predicted that “by 2020, 70 % of enterprises will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up from less than 5%... Webinar 2014-04-07

Applying Fine-Grained Authorization to Java MVC Applications with XACML

Type: Webinar
N-tier applications can be challenging from a security perspective. Security policies impact the user interface as well as the business layer and even the data layer. Users should only be presented... Webinar 2013-11-04