Do You Have a Business Case for Attribute Based Access Control (ABAC)?

Gartner recently predicted that “by 2020, 70 % of enterprises will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up from less than 5% today.” But what does this mean for your organization?

In this webinar we will address this and other questions surrounding ABAC. We will also present four key arguments as to why you should implement ABAC today, based on customer cases, namely:

  • Collaborate effectively without putting business critical information at risk
  • Minimise the risk of fraud through secure transactions
  • Meet compliance regulations and authorization governance requirements
  • Streamline IT development and reduce information security costs

The webinar covers topics such as:

  • What ABAC is and why enterprises are turning to it to protect critical assets
  • How you can best prepare your organization for ABAC
  • The advantages that can you expect to gain when utilizing ABAC



Other Resources

Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.