Attribute Based Access Control (ABAC) Authorizing Data Access

This is a joint webinar together with our partner First Point Global.
In this webinar we will demonstrate how dynamic authorisation supports innovation in the digital economy

With the explosive growth of social media, mobile, big data and cloud, business is under pressure to deliver consumer/customer/citizen-centric applications that are available anytime, anywhere, and from any device. Customers have choice. Services must be easy to use and relevant, and trust has to be established through respecting a person’s permission, preferences and privacy. To win in the digital economy, participants must continually “earn” their clients’ identity, ongoing engagement and loyalty.

Attribute Based Access Control enables “business or context” aware authorisation decisions, which adds a degree of business agility and client relevance that is simply impossible under the rigid Role Based Access Control (RBAC) authorisation model.

If you wish to play a lead role in the digital economy, and you are a data or security architect designing consumer/customer/citizen-facing applications and services, this webinar will present a number of valuable use cases which are driving competitive advantage and time to value in innovative companies today.

There will be a general introduction to ABAC along with a number of use cases that exemplify its application as a business enabler for the digital economy including:

  • the business value of ABAC
  • ABAC use cases for context aware information management
  • ABAC database filtering, the key to unlocking identity aware legacy data
  • the role of ABAC in a modern information security strategy


Other Resources

Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.