+
  • Resources

White Papers

Why traditional IAM solutions are no longer enough

Identity and Access Management (IAM) solutions are an amazing advancement and have saved countless headaches and work hours for today’s IT professionals. Without these solutions,...
White Papers

Evolving from RBAC to next generation ABAC

Enterprises face a rapid expansion of diverse users alongside an influx of applications, devices, APIs, and microservices. The amount of data created and consumed by...
Fact Sheets

Applying ABAC to your cloud migration

As enterprises continue to rapidly adopt and migrate data, applications and assets to the cloud, new challenges and opportunities arise. A significant challenge that has...
Fact Sheets

5 misconceptions about a policy-based approach to access control

At its core a policy-based access control model (also referred to as Attribute Based Access Control or “ABAC”) is a concept any developer can understand....
Fact Sheets

Policy-driven security for the financial industry

The need to secure information and assets has never been greater. Fraud, risks, and regulatory compliance must be addressed without hindering business initiatives. Striking the...
Datasheets

5 ways to get started with Dynamic Authorization

Organizations implementing attribute-based access control (ABAC) see higher levels of security, improved compliance and greater business agility. Below are the top five ways you can...
Datasheets

Dynamic Authorization: A game changer for Finance

All financial institutions have multi-pronged data access control challenges, particularly when it comes to privacy and compliance. They must protect each consumer’s privacy and confidential...
Webinars

Zero Trust Through Dynamic Authorization And Policy Driven Access

Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
Webinars

The Convergence of Cloud, DevOps and Access Control

Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Product Brief

MuleSoft Axiomatics Release Notes

Here’s where you can download the Axiomatics Connector Release Notes. The connector allows you to integrate with our authorization services through the Mulesoft Anypoint Platform.
Product Brief

MuleSoft Axiomatics Connector Users Guide

Here’s where you can download the MuleSoft Axiomatics Connector 1.0 Users guide:
Product Brief

MuleSoft Axiomatics Connector API Reference

Here’s where you can download the MuleSoft Axiomatics Connector 1.0 API Reference guide:
Business Cases

Dynamic Authorization in the Banking and Finance industry

All financial institutions have multi-pronged challenges for data access control in the areas of privacy and compliance. Firstly, it is the customer: to protect consumer...
Webinars

ABAC as code – Applying Modern DevOps to Policy Authoring

A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Webinars

Taking an identity-centric approach to a modern security architecture

Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.
White Papers

KuppingerCole Report – Market Compass: Dynamic Authorization Management

The KuppingerCole Market Compass on Dynamic Authorization Management provides an overview of the product or service offerings in selected market segments. The report has profiled...
Webinars

Improve security, consistency and enforce access rules across applications

Enterprises can create better access control management, consistency and strong audit control.  Through the power of Attribute-based Access Control (ABAC) for externalized dynamic authorization it can tackle any business requirement. Listen to experts from Axiomatics and Radiant Logic.
Webinars

Speed, Privacy and Security – Getting to the Value of Data in Apache Spark

This webinar is a conversation between Axiomatics experts Pablo Giambiagi and Gerry Gebel, and a deep-dive into the convergence of speed, privacy and security of...
Webinars

Using Elastic Dynamic Authorization for APIs, Microservices and Data

APIs have become the backbone of many services – from the weather forecast to delivery notifications and photo printing services. Not only can we consume...
Webinars

Modern Web Application Security for “Cloud First” Initiatives

The richness of Web Access Management (WAM) is critical to your organization because it’s often the hub of access for customers, employees, third parties and...
Case Studies

Efficient enterprise-wide risk management and secure collaboration using ABAC

A major US automotive manufacturer was faced with a consolidation challenge for their authorization. As with many large enterprises, security authorization had historically been handled...
Webinars

Open Source API Gateways and Dynamic Authorization: Working with Kong

APIs are used in almost all modern application projects and are usually tightly coupled with microservices. Securing APIs in different ways is critical and although...
Webinars

Dynamic Authorization for the Apigee API Gateway

One of the most common API gateways in the market that Axiomatics customers work with is Apigee. This gateway comes with built-in capabilities for extending...
Webinars

Controlling Access to Business-Critical Data

In this webinar, Axiomatics experts reveal how to use dynamic authorization to secure the content of data stores. Data on its own, in its own silo,...
White Papers

A Systematic Approach to Implementing Dynamic Authorization using Attribute Based Access Control

“That sounds hard.” Shifting to a new way of managing access control requires a new way of thinking. But the approach is straightforward. This paper...
Webinars

Using the Power of Federated Identity and Dynamic Authorization to Streamline Access Control – with Radiant Logic

Enterprises are implementing Attribute-Based Access Control (ABAC) for externalized dynamic authorization that is both policy-based for easier audit and fine-grained enough that it can tackle any...
Webinars

Authorization that Scales to the Cloud and Beyond

Companies are leveraging cloud native capabilities such as storage, orchestration, and compute to deliver value to their business; and much of net new application development...
Product Brief

Axiomatics Policy Server Product Sheet

The Axiomatics Policy Server is the industry-leading solution to control access to critical applications. Using externalized dynamic authorization, it provides the most efficient policy engine...
Webinars

Beyond OAuth: Securing APIs with Policies & ABAC

Måns Håkansson gave his presentation on securing APIs with policies and Attribute Based Access Control (ABAC) at this year’s KuppingerCole Cyber Access Summit / Cybersecurity...
Datasheets

Axiomatics Policy Server Datasheet

The Axiomatics Policy Server (APS) provides a complete authorization infrastructure that scales with the needs of the enterprise. Its dynamic authorization capabilities have been designed...
Product Brief

Dynamic Policy Driven Authorization for Agile Enterprises

Authorization is more relevant than ever. In particular, the pace of technological change argues against the hard-coded access control hierarchies of the past. Business disruptors...
Webinars

5 Hidden Pitfalls of DIY Access Control Development and How to Avoid Them

Build V. Buy: Organizations that attempt to build their own access control internally often overlook or significantly underestimate the effort required to build, operate, and...
Case Studies

Granular Access Control for a Complex Business Model

Modernizing Access Control in a B2B2C Organization with Dynamic Authorization The Company needed to securely share data throughout the complex delivery layers of a “B2B2C”...
White Papers

Top 10 Misconceptions of a Policy-Based Approach

Even for senior software developers, wading into the world of IAM (Identity & Access Management) and access control can be daunting. Making your way through the...
White Papers

Get to the Cloud Faster, and More Securely

As enterprises continue to migrate applications, services and workloads to the cloud, they are addressing the challenge of how to protect resources in an open,...
Product Brief

MuleSoft Anypoint Platform Integration

A policy-based approach like dynamic authorization provides fine-grained access control and the protection of IP and critical assets that are part of fast-moving API projects.
Webinars

Securing Critical Enterprise Applications and APIs with Dynamic, Risk-based Authorization and Governance

Until now, Identity Governance and Administration (IGA) and ABAC tools have largely been deployed and operated independently of each other. However, there is significant value...
Product Brief

Dynamic Authorization Extension for SharePoint®

The Dynamic Authorization Extension for SharePoint integrates the Axiomatics Policy Server into existing SharePoint sites to provide dynamic Attribute Based Access Control (ABAC) to assets...
Webinars

Securing APIs and Microservices with ABAC, OAuth, and OIDC

Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert to offer comprehensive...
White Papers

Infographic: Build vs. Buy for Dynamic Authorization Solutions

When making a Build vs Buy decision for IAM and dynamic authorization, you must take into account the hidden costs of DIY. In this infographic,...
Webinars

Authorization Made Simple: Using ALFA, REST, and JSON to Secure Applications

As more companies across all industries develop more applications, the challenge of securing those applications becomes more complex. In this webinar, Jonas Iggbom and David...
White Papers

Build vs Buy for Dynamic Authorization Solutions

When should you consider investing in Dynamic Authorization software versus building your own in-house solution? When evaluating the best approach to securing your APIs, applications,...
White Papers

Technical Viewpoint: Protecting Microservices and APIs with ABAC, OAuth, and OpenID Connect

Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert to offer comprehensive...
Webinars

Streamline Access Control with Federated Identity and ABAC

Enterprises are pained by legacy access control approaches. They are looking to achieve better access control management and consistency along with strong audit control and...
Analyst Reports

KuppingerCole Report – Executive View: Axiomatics Policy Server

The Axiomatics Policy Server (APS) has been named among the leading access control solutions for its outstanding features according to KuppingerCole in this Executive View...
Webinars

SmartGuard® for Data Demo

The security risk of data stores is emerging as a threat, and data breaches will be bigger than ever – with even more data at...
Webinars

Glossary of Terms: Understanding Attribute Based Access Control

This glossary includes terms defined for architecture, services, and key phrases related to Attribute Based Access Control and the Axiomatics Product Suite.
Use Cases

Federal Mission: Applying ABAC to Your Cloud Migration

This Use Case, Federal Mission: Applying ABAC to Your Cloud Migration, is tailored for government agencies, who have some of the most burdensome security requirements....
Product Brief

Axiomatics Data Access Filter for Multiple Databases – Product Sheet

Get to the heart of access control, with policy-based authorization applied on the content of relational databases. The Axiomatics Data Access Filter for Multiple Databases...
Case Studies

European bank achieves proactive data security, compliance with ABAC

Executive Summary The primary driver for this project was to achieve compliance with a Personal Data Protection Law and to prepare for future regulatory challenges....
Webinars

A Practical Approach to GDPR Requirements

At the time of this webinar, many enterprises are/were finalizing their plans for addressing new requirements of the GDPR directive. GDPR has both a business...
Case Studies

Fortune 500 Transportation Company Simplifies Access Control for 175,000 Users

One of the largest freight transportation companies in the world, with over 50,000 employees, stores and manages data with access in mind for over 175,000...
Analyst Reports

KuppingerCole Report – Executive View: Axiomatics Data Centric Security

KuppingerCole’s Executive View reports offer advice to IT professionals looking for data-centric security. In the October 2017 report, Axiomatics’ data-centric dynamic authorization suite is profiled....
Webinars

Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture – Using ABAC for APIs and Microservices

As opposed to traditional monolithic applications, a (micro)service-based architecture comprises multiple loosely coupled modules (“services”) that serve specific business purposes and communicate over lightweight network...
White Papers

Empower the New Identity Architecture: Combine a Federated Identity Service with Attribute Based Access Control (ABAC)

In today’s complex identity infrastructures, flexibility has become an essential requirement. The rise of cloud-based platforms, SaaS applications along with other industry trends such as...
White Papers

EY Digital Identity and Access Management Report

As organizations shift business strategies towards new digital channels to maintain a competitive advantage, and consumers become increasingly reliant on multiple device connections, cybersecurity threats...
Product Brief

6 Alarming Facts About Electronic Health Records

One of the most difficult issues for a CIO to tackle is the ability to know who has access to what critical data and why....
About Us

Why Axiomatics Federal?

  As the global independent leader in Dynamic Authorization solutions for Federal Government, our people, expertise, and our best-in-class software set us apart. Agencies come...
Use Cases

Security Compliance Using Externalized Authorization

Central Decision Point for Fine-grained Access Control: Entitlements Management To effectively comply with various industry regulations, businesses require integrated, cost-effective information risk management solutions that...
Analyst Reports

KuppingerCole Executive View: Axiomatics Policy Management Suite

The Axiomatics Policy Management suite provides a solution for companies wanting to provide fine grained access control to protected resources. This means evaluating a user’s...
White Papers

5 Fast Facts for API Access Control

APIs have become the defacto method for connecting people with data. This is great news for users: access is much smoother and often instantaneous. But...
About Us

Why Axiomatics?

As the global independent leader in Dynamic Authorization solutions, our people, expertise, and our best-in-class software set us apart. Customers come to us to solve...
Case Studies

Federal Mission: Security Compliance using Externalized Authorization Management (EAM)

United States federal agencies are beholden to myriad regulations and standards, some of the most notable of which are the FIPS Publication 200 and the...
White Papers

The State of Data Centric Security

Data-centric security signifies a new generation of database security techniques, based on a combination of robust and proven technologies: contextual data filtering, dynamic data masking...
White Papers

Solving New Collaboration, Security, Cloud and Mobilization Challenges in the Energy Sector

Discover how companies in the power and utilities sectors can use attribute based access control to safeguard and securely share sensitive data within their ecosystems.
Webinars

Webinar: Externalized Dynamic Authorization in a [Micro]Services World

Externalized Dynamic Authorization in a [Micro]Services World Key Takeaways: Enforcing authorization on the response leg to incorporate characteristics of the resources being protected Utilizing scopes...
White Papers

What is Attribute Based Access Control?

Protect Critical Assets and Enable Information Sharing What is Attribute Based Access Control? Access control has gone beyond simply need-to-know to include need-to-share authorization. Traditionally,...
About Us

Protect Critical Data and Enable Collaboration with ABAC

Access control has evolved to meet the changing security challenges organizations face in the digital age. Attribute Based Access Control, known in brief as ABAC,...
White Papers

The Basics of Attribute Based Access Control (ABAC)

Traditionally, the focus of authorization and access control has been on building barriers to sensitive data and only making it available to a select few....
White Papers

Data-centric Security for Pharmaceuticals – Executive Summary

Providing the right stakeholders with unobstructed access to sensitive data is essential in any industry. Within the pharmaceutical and biotech industries, inefficient data sharing and collaboration slow...
White Papers

Axiomatics Primer: OAuth and OpenID Connect

Learn how to approach applying Externalized Dynamic Authorization to an API and/or microservices architecture that uses OAuth 2.0 flows and/or OpenID Connect (OIDC), with this...
White Papers

Why Externalized Authorization? (for Federal Government)

“What will my organization gain from externalized authorization?” It’s a question our team hears often. Axiomatics understands our dynamic world that requires organizations to be more...
White Papers

Why You Should Externalize Your Authorization

“What will my organization gain from externalized authorization?” “Will our performance suffer?” “My team enjoys the challenge of writing their own code.” Axiomatics understands our dynamic...
About Us

Axiomatics Dynamic Authorization

Unified Dynamic Authorization: Enterprise Access Control, Anywhere, anytime.  Axiomatics provides externalized authorization through attribute and policy-based access control for applications, databases, Big Data, APIs and microservices....
Webinars

(Big) Data Security: Protecting Information at the Source

With the growing adoption of cloud computing, Big Data or open APIs, managing, securing and sharing massive amounts of digital data across heterogeneous and increasingly...
Webinars

Extending CA Single Sign-On with XACML Capabilities

Axiomatics CA Validated extension for CA Single Sign-On leverages Single Sign-On’s existing authorization capabilities and allows users to implement risk-intelligent policies that adapt with an...
Case Studies

Federal Mission: Dissemination and Information Sharing using ABAC

Law enforcement, defense, and intelligence agencies are under the obligation to securely share as much information as possible within their respective communities. The keyword here...
Use Cases

Federal Government: Insider Threat Use Case

U.S. federal government agencies hold information that, if released from control, could do grave harm to the country and its citizens. This information includes Personally...
Product Brief

Axiomatics Policy Server for the Federal Government Product Sheet

The federal government is faced with a unique set of challenges that require a fine-grained approach to access control. The Axiomatics flagship product, the Axiomatics...
Case Studies

Bell: Cutting through the Code to Meet Export Control Regulations

When Bell realized the scale required to develop an in-house access control system to manage strict export regulations, the decision was made to look externally,...
Analyst Reports

KuppingerCole Leadership Compass 2014

The Axiomatics Policy Server was featured in this Leadership Compass from KuppingerCole, by analyst Graham Williamson: Dynamic Authorization Management: Leaders in innovation, product features, and market...
Analyst Reports

KuppingerCole Executive View: Axiomatics Data Access Filter

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see...
Product Brief

Federal Government: Five Ways to Prepare for an ABAC Program

Agencies within the federal government are beginning to adopt a policy-based approach to access control using ABAC. In this process, agencies are faced with the...
Use Cases

Federal Government: Cross-domain ABAC Use Case

Agencies look to Cross Domain Solutions (CDS) to transfer information between these domains in a way that ensures the timely sharing of information while still...
Product Brief

Five Ways to Prepare for an ABAC Program

As adoption of a policy-based approach to access control using ABAC becomes more widespread, organizations are faced with the challenges of how to prepare for...
Product Brief

SmartGuard® for Data – Product Sheet

SmartGuard for Data from Axiomatics protects big data stores against unauthorized access and exfiltration of data; only allowing authorized users or applications to access the...
Product Brief

SmartGuard® for Data – Data Sheet

SmartGuard for Data from Axiomatics protects big data stores against unauthorized access and exfiltration of data; only allowing authorized users or applications to access the...
Webinars

The Future of Data-Centric Security

Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization. The data access filtering...
Webinars

Authorization for Big Data: Introducing SmartGuard

Safeguard Information Assets with SmartGuardTM for Big Data We are seeing a strong, impressive adoption pace of Big Data systems within enterprises. Primarily driven by...
Case Studies

Danish Defence – A Secure Solution for Sharing Information Electronically

A joint project with Axway, Axiomatics and Sopra Steria, this case study outlines the Danish Defence project. A secure solution forexposing APIs to send and receive information...
Webinars

Axiomatics Boot Camp: Testing XACML Policies Using JUnit, Eclipse, and the Abbreviated Language for Authorization (ALFA)

Experts Henrik Johansson of Knowit and David Brossard of Axiomatics provide a deep dive into testing XACML policies in this technical webinar. We start with...
Webinars

Axiomatics Back to Basics: ABAC 101

The benefits of Attribute Based Access Control (ABAC) for your organization. Attribute-Based Access Control is the most robust, flexible and fine-grained solution that is ideal for...
White Papers

Federal Government: How ABAC fits into an IAM Framework

IAM teams in the federal government are finding that Attribute Based Access Control is key to meeting regulatory and compliance requirements. ABAC is an access...
Webinars

Axiomatics Boot Camp: Spring Security and ABAC

To enable the use of fine-grained Attributed Based Access Control (ABAC) model within the Spring framework, Axiomatics introduced the XACML PEP SDK for Spring Security. In...
Use Cases

Attribute Based Access Control for Manufacturing

Attribute Based Access Control for Manufacturing Manufacturers around the globe are faced with the growing risk of breaches – in many cases the attackers are...
Webinars

Boot Camp: Creating a Policy Enforcement Point

Axiomatics has a new Java PEP SDK available with performance improvements. This boot camp session shares the details of the new SDK and what’s changed...
Webinars

Toxic Pairs, Role Explosion, and the Evolution of RBAC

A Practical Guide for Fine-Grained Access Control It’s 2016 and the days of Sherlock Holmes are long gone. Yet mysteries and puzzles abound more than...
Webinars

Proving Compliance throughout the ABAC Lifecycle

One of the benefits of Attribute Based Access Control is the ability to fine-tune compliance checks and balances in real time, and make changes to...
Webinars

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

A Webinar with Axiomatics and IAM Analysts KuppingerCole: Take me to recording Join Axiomatics and leading analyst firm KuppingerCole to learn more about Attribute Based Access Control...
Product Brief

Axiomatics Review Manager

Enforcing complex and changing regulations is a continuous challenge for enterprises and federal agencies; it’s a costly and time-consuming activity that requires ongoing diligence. The first part...
Product Brief

Axiomatics Review Manager Product Sheet

Enforcing complex and changing regulations is a continuous problem for enterprises and federal agencies. It is both a costly and time-consuming activity that requires ongoing...
Webinars

The CISO’s Guide to Planning for ABAC Success – with Guest Speakers from Security Architects Partners

A webinar with Axiomatics and Security Architects Partners Axiomatics and Security Architects Partners present this session on the components for a successful transition from legacy access...
Webinars

Delivering Fine-Grained Authorization Today by Leveraging a Federated Identity Service and ABAC

A webinar with Axiomatics and Radiant Logic A recent Gartner report predicts that by 2020, 70% of organizations will use Attribute-Based Access Control (ABAC) to...
Webinars

How Top Banks Use an Attribute-Based Approach (ABAC) to Protect PII, Critical Assets, and Meet Regulations

Find out why Attribute Based Access Control is the solution for the world’s leading banks and financial institutions. As demands for better online services– from...
White Papers

Making a Business Case for Attribute Based Access Control (ABAC)

Cut Costs, Streamline Access Control and Achieve Compliance. Are you looking to shift your access control approach to handle today’s complex IT environment? Or maybe...
Webinars

Healing Data Leakage in the Modern Health Care Environment

The move to electronic records (EHR) in the health care industry – across providers, insurance companies and a multitude of third parties – has increased...
Webinars

Axiomatics Boot Camp: ABAC and XACML Made Easy – Using ALFA to Write Fine-Grained Authorization Policies

Does the promise of attribute-based access control sound like magic? Don’t worry, you don’t need to be a wizard to write efficient and secure ABAC...
Webinars

Building Love and Compatibility between RBAC and ABAC

As legacy data access control models such as Role Based Access Control begin to break down, industries are moving to the next generation of access...
Webinars

Joint webinar with Axway – Protecting Your Data Beyond the Enterprise with Fine Grained Access Control for APIs and Data

Please join Axiomatics and Mark O’Neill, VP of Innovation at Axway, as we discuss the role that fine grained access control plays in securing APIs...
Webinars

New Years Detox – Eliminating Toxic Combinations in your Access Control

As access control has become more complex, the assignment of roles has exploded out of control, making it harder to eliminate toxic combinations of roles...
Webinars

Axiomatics Boot Camp – Database Filtering and Policy Creation

Data Access Filtering is the ability to apply access policies to database requests to ensure that only authorized individuals are allowed to read and write...
White Papers

Axiomatics Data Access Filter – Next Generation Data-Centric Security

This whitepaper introduces the Axiomatics Data Access Filter product family. The data access filtering approach represents a new generation of database security techniques, based on a combination...
Webinars

Centralizing the Code – Separating Authorization Logic from Apps

For any business in the Fortune 1000 – such as health care, insurance, banking, pharmaceuticals and manufacturing – the need to shift beyond legacy role-based...
Analyst Reports

KuppingerCole Executive View Axiomatics Data Access Filter

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see...
Product Brief

Safe Harbor: The New Privacy Challenges

Now that Safe Harbor agreement has been deemed invalid global organizations with employees and customers in Europe face new data privacy challenges. To meet compliance...
Product Brief

Axiomatics Extension for CA Single Sign-On

This product sheet explains how the Axiomatics Extension for CA Single Sign-On delivers dynamic authorization for web access management by enforcing user permissions based on corporate policies and...
White Papers

Axiomatics Policy Auditor

The Axiomatics Policy Auditor (APA) with Prover Plug-In1 delivers a platform for auditors and IT administrators to analyze and audit eXtensible Access Control Markup Language...
Product Brief

Axiomatics Integration for CA API Gateway

APIs have revolutionized the way that application data can be accessed. The richness they offer enables organizations to cater for today’s modern way of communicating...
Product Brief

Axiomatics Data Access Filter for Multiple Databases – Data Sheet

The Axiomatics Data Access Filter applies access policies to database requests, thereby ensuring that only authorized individuals are allowed to read and write data, and...
Webinars

XACML Experts Panel Discussion

Everything you ever wanted to know about XACML but were afraid to ask. This panel discussion features our three top experts for the XACML language. Gerry...
Webinars

API Authorization – Secure Sensitive Data with Attribute Based Access Control

In this session we have invited a very special guest speaker, Anderson Gray from CA Technologies for a look at the growth of APIs, trends,...
Webinars

Axiomatics Boot Camp 101 – Filter Sensitive Data at the Database Layer and Keep it Secure

With so much rich, valuable data stored in databases, they are constantly targeted and too often breached. By dynamically filtering and masking data at the...
Webinars

From Static Roles to Dynamic Attribute-Based Authorization

This is a joint webinar together with analyst firm KuppingerCole. The webinar is hosted on KuppingerCole’s website.  Dynamic authorisation systems complement or replace the rigid...
Webinars

Axiomatics Bootcamp 201 – Using JSON and REST Profiles for External Authorization

JSON and REST are widely used to implement lightweight and fast web services. This Axiomatics Boot Camp session will provide technical insight into using these...
White Papers

Getting the OWASP Top Ten Right with Dynamic Authorization

The non-stop drum beat of data breaches and non-stop security issues show that a new approach to security is required writ large. Application security can...
White Papers

Meeting Health Care Privacy Regulations with Attribute Based Access Control

Personally Identifiable Information (PII) with related sensitive health care data is increasingly being maintained in electronic records. This means PII data can be made available,...
White Papers

The Identity & Access Management (R)evolution

Ready to evolve your access control to meet new complexities? Many organizations are currently striving to develop new strategies in their IAM vision and roadmap...
White Papers

Shifting to Attribute Based Access Control

No longer is a company’s data restricted by the boundaries imposed by physical office space and a local area network. Data sharing and collaboration transcend...
White Papers

Adding Fine-Grained Authorization to CA Single Sign-On

The Axiomatics Extension for CA Single Sign-On uses the Authorization API to seamlessly insert XACML capabilities into the product to add fine-grained authorization capabilities. Read...
White Papers

Increasing the Value of Information with Fine Grained Security for Data Marts

Knowledge intensive industries, such as Pharma, Banking, Insurance, Media and Energy, increasingly rely upon timely access to integrated information for innovation and product development, as...
White Papers

Getting Started With Attribute Based Access Control

Implementation of an Attribute Based Access Control (ABAC) system is accomplished by the completion of three main task groups: Policy Modeling Attribute Sourcing Application Integration By...
White Papers

Enforcing Segregation of Duties

About Enforcing Segregation of Duties White Paper IT organizations have struggled to identify potential Segregation of Duties (SoD) violations within their IT systems. A violation...
White Papers

The Key to API Security

This solution brief is an overview on how Attribute-Based Access Control (ABAC) brings security and agility to the API infrastructure. APIs have revolutionized the way...
Product Brief

Financial Services Industry Brief

Is it possible to protect access to sensitive information and secure financial transactions without sacrificing business agility? It is with dynamic authorization and policy-driven access...
Product Brief

Manufacturing: The Essential Guide to Sharing and Securing Sensitive Data

Global industries depend on information sharing across the borders of nations and jurisdictions. Intellectual properties are at stake and export control compliance is non-negotiable. An...
Product Brief

Insurance Industry Brief

Insurance companies go to market via agents and agents of agents. Clients expect efficient and secure online services. Authorities demand strict regulatory compliance. Attribute Based...
Case Studies

CSS Insurance – Onboarding New Authorization Tasks

Having tested various solutions to resolve authorization issues with their corporate document management system, CSS Insurance turned to the Axiomatics Policy Server (APS) to deliver...
Business Cases

Cross Border Privacy Enforcement – Global Financial Services and the Data Flow Challenge

Privacy regulations impact cross-border transactions in the financial services industry. Domestic processing of personally identifiable information (PII) and the transfer thereof for storage or processing...
Webinars

Axiomatics Bootcamp ABAC 101

This “bootcamp” style webinar provides a basic overview of Attribute Based Access Control (ABAC) and how it helps solve complex data access control challenges. Enterprises...
Webinars

Beyond Database Security

This is a joint webinar together with analyst firm KuppingerCole. Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In...
Webinars

Enhancing Spring Security

Spring Security provides authentication, basic authorization and other security features for the widely used Java application framework Spring and it is a popular choice for...
Webinars

Overcoming Role Explosion Challenges with Attribute-Based Access Control

Access control has been predominantly managed with a legacy static model based on user roles – called “Role-based Access Control“, or RBAC. Enterprises that use...
Webinars

Cutting through export control with Bell helicopter and Axiomatics

In this webinar, together with guest speaker Greg Heartsfield from Bell Helicopter, we will focus on the complexity of export control and PLM systems and...
Webinars

Enabling ABAC on APIs

Axiomatics attended the annual partner and customer conference Axway Connections at the prestigious Silverstone F1 circuit in Northamptonshire. Our VP of Customer Relations, David Brossard, held...
Webinars

Access Control Obstacles – How to Win the Challenge of IT vs. Business Units

Attribute Based Access Control (ABAC) may be the future of identity and access management (just ask analysts Gartner and KuppingerCole) but up until now there...
Webinars

Using the OWASP Top Ten to Upgrade Your Authorization Services

This is an exiting webinar on how the OWASP Top Ten can help you upgrade your authorization services. Our Americas President, and resident Attribute-based Access...
Webinars

The #1 New Year’s Resolution: Lock Down Your Data Access

High profile data leaks are in the news almost daily – sensitive data is being accessed, released to the public, or stolen by identity thieves....
Webinars

Securing Data Is a Four Letter Word

It seems that every morning we wake up to news of yet another high profile data leak. Sensitive or business critical information has been improperly...
Webinars

Building an Effective API Security Framework Using ABAC

Today, information is shared like never before. Whether it’s for business or private purposes, people expect information to be readily available. APIs are a great...
Webinars

The ABAC Advantage According to NIST – What the Guidelines and the Users Have to Say

In this webinar we will discuss the ABAC advantage according to the National Institute for Standards and Technology (NIST).
Webinars

Attribute Based Access Control (ABAC) Authorizing Data Access

This is a joint webinar together with our partner First Point Global. In this webinar we will demonstrate how dynamic authorisation supports innovation in the...
Webinars

Dynamic Access Control for Insurance Companies

In this webinar we will investigate in more detail why and how companies are adopting Attribute Based Access Control (ABAC) and learn more about the...
Webinars

Protect Sensitive Data(bases): Enforce Compliance at Any Access Point

In the past, protection of sensitive data has revolved around a patchwork of complementary methods and technologies. Transparency is compromised as complexity increases and the...
Webinars

Get Started Now! Achieving Attribute Based Access Control (ABAC) for Applications with XACML

The Axiomatics Policy Server delivers dynamic, fine-grained authorization for applications. It enables organizations to enforce corporate policies throughout an entire organization based on multiple attributes...
Webinars

Do You Have a Business Case for Attribute Based Access Control (ABAC)?

Gartner recently predicted that “by 2020, 70 % of enterprises will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up...
Webinars

Enabling New Business Opportunities While Balancing Risks in the Financial Services Industry

If IT empowers users to take on risks beyond corporate policy limits, the bank may have to pick up the bill. This is the reason...
Webinars

Privacy Regulations – a Complex Authorization Challenge for Today’s Organizations

Efficient processing and sharing of information is essential in every organization. However, security often fails. This typically leads to either of two scenarios: Data is...
Webinars

Applying Fine-Grained Authorization to Java MVC Applications with XACML

N-tier applications can be challenging from a security perspective. Security policies impact the user interface as well as the business layer and even the data...
Webinars

Tutorial: A Beginner’s Guide to XACML (Part 2) Getting Started with ALFA

The ALFA Plugin for Eclipse is a tool that converts your Eclipse programming IDE to a dedicated editor of authorization policies using ALFA syntax. ALFA...
Webinars

Tutorial: A Beginner’s Guide to XACML (Part 1)

In part one of our “Tutorial: A Beginner’s Guide to XACML (Part 1) we take a look at attribute-based access control (ABAC) and how it...

Get in Touch

Regulations are getting stricter and competitors are getting more aggressive. Don’t spend time on authorization, focus on your core activities and we will ensure data is secured and regulations are met.

Customer Support

Do you have a question for an Axiomatics engineer? Our support team are ready to help you.