+

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

A Webinar with Axiomatics and IAM Analysts KuppingerCole: Take me to recording

Join Axiomatics and leading analyst firm KuppingerCole to learn more about Attribute Based Access Control (ABAC).

ABAC solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments in which companies operate these days. However, due to the number of moving parts, it becomes harder to understand the effect a policy change might have in a complex policy set. These moving parts include the policies themselves, attribute values and the specific queries under consideration.

In this KuppingerCole webinar, you will hear about:

  • Providing the power to create and enforce fine grained access control policies
  • A solution that makes the journey to ABAC as frictionless as possible
  • A gap analysis tool that’s able to provide answers to complex access control questions
  • Improving governance and reducing software development costs through authorisation
  • How to centralise policy for disparate applications
  • Governance improvements in authorisation service approach using access review management.

Other Resources

Webinars
Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
Webinars
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Webinars
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.