Do You Have a Business Case for Attribute Based Access Control (ABAC)?

Gartner recently predicted that “by 2020, 70 % of enterprises will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up from less than 5% today.” But what does this mean for your organization?

In this webinar we will address this and other questions surrounding ABAC. We will also present four key arguments as to why you should implement ABAC today, based on customer cases, namely:

  • Collaborate effectively without putting business critical information at risk
  • Minimise the risk of fraud through secure transactions
  • Meet compliance regulations and authorization governance requirements
  • Streamline IT development and reduce information security costs

The webinar covers topics such as:

  • What ABAC is and why enterprises are turning to it to protect critical assets
  • How you can best prepare your organization for ABAC
  • The advantages that can you expect to gain when utilizing ABAC



Other Resources

The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.