Information Management: Federal Trends 2020

This article appeared recently in Information Management. Written by Gerry Gebel the Vice president of business development at Axiomatics. Information Management: 6 Data Security Trends and Challenges for Federal Agencies in 2020 Data security is rapidly evolving in the federal sector as new threats and challenges emerge daily. Every year, new devices and technologies emerge […]

Using Elastic Dynamic Authorization for APIs, Microservices and Data

APIs have become the backbone of many services – from the weather forecast to delivery notifications and photo printing services. Not only can we consume data and services more readily through those APIs but we can also mash them up into greater services. To do so, we tackled API security through OAuth and OpenID Connect. […]

Modern Web Application Security for “Cloud First” Initiatives

The richness of Web Access Management (WAM) is critical to your organization because it’s often the hub of access for customers, employees, third parties and more. And so is your “Cloud First” strategy. Single sign-on is expected, but achieving this while securing access to your applications in a Cloud-Hybrid word is fraught with risks and […]

Efficient Enterprise-Wide Risk Management and Secure Collaboration Using ABAC

A major US automotive manufacturer was faced with a consolidation challenge for their authorization. As with many large enterprises, security authorization had historically been handled by individual business units or product owners. Over time, this car company wanted the benefits of moving to a standardized approach to access control, and built their own authorization engine. […]

SC Magazine: DevOps to DevSecOps: How to ensure a smooth transition

This article by Niklas Jakobsson, CEO of Axiomatics, originally appeared in SC Magazine. SC Magazine: DevOps to DevSecOps: How to ensure a smooth transition Security technologies must fit into an automated model so they can be deployed and managed in the same manner as a microservices architecture or the full potential of DevSecOps will not […]

Axiomatics Latest Updates Improve Delivery of Dynamic Authorization for Hybrid, Cloud Environments

Axiomatics is improving the delivery of dynamic authorization for multiple assets across hybrid, cloud and on-prem environments. IDN looks at the latest Axiomatics Policy Server and other updates with company execs. This article originally appeared in Integration Developer News. by Vance McCarthy, Integration Developer News “Our cloud-native PDP ensures all elements of the cloud remain […]

Digital Journal Q&A: How to control access to IoT data

Q&A: How to control access to IoT data By Tim Sandle This article appeared in Digital Journal. IoT is responsible for driving the biggest quantity of data into data lakes for businesses to analyze and leverage for analytics. With so much data at stake, companies must control who can and cannot access that data. This is […]

A Systematic Approach to Implementing Dynamic Authorization using Attribute Based Access Control

“That sounds hard.” Shifting to a new way of managing access control requires a new way of thinking. But the approach is straighforward. This paper will break down the process into digestible, easy-to-implement steps as you switch to a policy-based approach, and upgrade your legacy role-based system. In RBAC, users are assigned roles and roles […]

Using the Power of Federated Identity and Dynamic Authorization to Streamline Access Control – with Radiant Logic

Enterprises are implementing Attribute-Based Access Control (ABAC) for externalized dynamic authorization that is both policy-based for easier audit and fine-grained enough that it can tackle any business requirement. Along the way, deployment challenges emerge: ABAC needs attributes, and attributes are linked to entities/objects and processes that are scattered across all identity and data silos. To provide […]

Authorization that Scales to the Cloud and Beyond

Companies are leveraging cloud native capabilities such as storage, orchestration, and compute to deliver value to their business; and much of net new application development now takes place in the cloud at a faster pace than ever before. We see the proliferation of more services, more users, and more data which all translate to more […]

VMblog shares Axiomatics 2019 Predictions: Data Security

2019 Modern Data Center Technology Prediction Series Industry executives and experts share their predictions for 2019. Gerry Gebel, our VP of Business Development, contributed this article as part of the 11th annual VMblog.com series exclusive. Data Security As new security threats emerge and threaten sensitive customer information, businesses must develop new procedures and adopt modern […]

IT Pro Portal:Critical Data Security Trends for 2019 and beyond

An article by Gerry Gebel in www.itproportal.com; IT Pro Portal covers the Critical Data Security Trends for 2019 and beyond.  It originally appeared here. Critical data security trends for 2019 and beyond Let’s take an in-depth look into the trends we expect to shape the data security landscape next year. Enterprise security is rapidly evolving […]

Cloud Computing Ranks: The number one 2019 career skill

Article originally posted in VM Virtual Machine. Cloud computing ranks: The number one 2019 career skill 2019 is the Year of the Pig, but will it also be the Year of the Cloud? Social media giant LinkedIn released a blog about “The Skills Companies Need Most in 2019 – And How to Learn Them”. What’s […]

CloudPost: Seven Big Data Security Trends of 2019

2018 was a monumental year for cloud technologies and data security. As businesses moved application workflows to the cloud, they were forced to manage new data security challenges to balance a new modern hybrid data storage model that combines both cloud and on-premise infrastructures. An article in CloudPost By Gerry Gebel, Vice President of Business Development  […]

DZone: Breaking Down the DevSecOps Approach

Take a look at how DevSecOps truly works to make your apps more secure. A feature article in DZone by Gerry Gebel. To keep pace with today’s on-demand world, organizations have shifted toward modern development practices like DevOps to immediately deliver products and services to their customers. DevOps merges software development and software operations teams, […]

DZone: Why Attribute-Based Access Control – The Evolution from RBAC to ABAC in Data Access Control

Learn more about the evolution from RBAC to ABAC in data access control. A feature article in DZone by Måns Håkansson Evolving from ACLs and RBAC, ABAC is now the standard model for organizations to ensure employees only have access to the information they need under the right circumstances. Today, data is often characterized as […]

JAXenter: Predictions for the new year – Crucial data security trends and challenges for 2019

2019 has only just begun – what will the year hold? Ring in the new year with tech predictions from the experts. Today, Pablo Giambiagi, Vice President of Strategic Research at Axiomatics dives into the trends and challenges for data security in 2019. Read the article in its entirety here. Predictions for the new year: […]

Beyond OAuth: Securing APIs with Policies & ABAC

Måns Håkansson gave his presentation on securing APIs with policies and Attribute Based Access Control (ABAC) at this year’s KuppingerCole Cyber Access Summit / Cybersecurity Leadership Summit in Berlin on November 14th, 2018. Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert […]

Insights Success: Axiomatics Feature

Axiomatics: An Independent Leader in Dynamic Authorization Solutions Axiomatics was featured in Insights Success as the leader in dynamic authorization. Read the full article here: Axiomatics: An Independent Leader in Dynamic Authorization Solutions   Headquartered at Stockholm, Sweden, Axiomatics provides access control software that protects the most critical assets of today’s modern enterprises. This includes applications and […]

Data Center Post: The Stark Reality of Insider Threat

Data Center Post: The Stark Reality of Insider Threat, and What Your Business Can do about It. By Gerry Gebel, Vice President of Business Development at Axiomatics Modern access control technologies like dynamic authorization can ensure information isn’t exposed to unauthorized users within an organization. Businesses and government agencies worldwide hold information that, if it fell into the […]

TMCnet InfoTech Spotlight: Federated Identity Management and Dynamic Authorization

TMCnet InfoTech Spotlight: Combining Federated Identity Management with Dynamic Authorization The virtualization of nearly everything digital is pushing more and more applications, services, storage, and compute to the cloud, now including real time communications (voice, video, messaging, collaboration) and combinations of connected machines and humans. Enterprises, governments, and individuals are operating in continuous contact, in […]

Dynamic Policy Driven Authorization for Agile Enterprises

Authorization is more relevant than ever. In particular, the pace of technological change argues against the hard-coded access control hierarchies of the past. Business disruptors impact many industries (such as IoT) and force companies to be more agile and proactive (rather than reactive). The new way forward is to choose patterns and technologies that will […]

5 Hidden Pitfalls of DIY Access Control Development and How to Avoid Them

Build V. Buy: Organizations that attempt to build their own access control internally often overlook or significantly underestimate the effort required to build, operate, and maintain security, functionality, and compliance in their DIY solutions. This is particularly true for regulated entities where internal development efforts undervalue the burden of compliance with internal audits or regulatory regimes […]

Top 10 Misconceptions of a Policy-Based Approach

Even for senior software developers, wading into the world of IAM (Identity & Access Management) and access control can be daunting. Making your way through the acronyms is a chore in and of itself — RBAC, ABAC, PBAC, XACML, SAML, etc. Then, you must wrap your head around the complexities of roles, permissions, attributes and so […]

Enhancing Cloud Security for AWS Deployments

As organizations continue to move their IT infrastructure to AWS or other cloud providers, addressing complex access control use cases with dynamic authorization is essential. by Gerry Gebel for CSO Online So many organizations are migrating their entire IT infrastructure to the cloud and adopting a “cloud first” approach. With this approach, organizations cut down […]

Get to the Cloud Faster, and More Securely

As enterprises continue to migrate applications, services and workloads to the cloud, they are addressing the challenge of how to protect resources in an open, cloud environment while also securely sharing the right information. It’s an opportunity to rethink how your enterprise manages Identity and Access Management (IAM) and how to ensure that your cloud […]

MuleSoft Anypoint Platform Integration

A policy-based approach like dynamic authorization provides fine-grained access control and the protection of IP and critical assets that are part of fast-moving API projects.

Securing Critical Enterprise Applications and APIs with Dynamic, Risk-based Authorization and Governance

Until now, Identity Governance and Administration (IGA) and ABAC tools have largely been deployed and operated independently of each other. However, there is significant value in describing and implementing a set of use cases where integrations between IGA and ABAC systems can be accomplished to further ensure best-in-class IAM. Growing customer requirements are the key […]

CSO Online Feature: Securing Continuous Deployment for Applications in the Cloud

Container orchestration tools lack the necessary security controls but attribute based access control (ABAC) can help by Gerry Gebel Application containers have quickly gained popularity as businesses continue to build and deploy applications in the cloud or on-premise. In fact, according to a recent study conducted by 451 Research, application containers will be a $2.7 billion […]

CSO Online Feature: When Security and Privacy Overrule Convenience

Organizations can enable end-to-end API security with OAuth, OpenID Connect and ABAC by Gerry Gebel for CSO Online Modern technology is constantly making our lives easier. Our phones and the applications we use make it more convenient to work, play and listen. If you need door-to-door ground transportation, you can access a ridesharing app to […]

DevOps.com Feature: DevOps: Making the Development Cycle More Secure

By Gerry Gebel for DevOps.com Fundamentally, DevOps is all about speed and agility. Customers expect companies to deliver and update applications at an accelerated pace and businesses must adopt modern technologies to meet customer expectations. With DevOps, organizations can implement a continuous development and deployment cycle to reap a multitude of benefits. Not only can […]

CSO Online Feature: Connecting ABAC to Identity Governance and Administration to Extend Access Control Capabilities

Enterprises need an approach to improve synergies between existing IAM technologies As applications, data and infrastructure continue moving into the cloud, the need for authorization of users to have the right access at the right time increases as well. The new enterprise is a hybrid of cloud and on-premise deployments all requiring a vetted, comprehensive […]

CloudPOST Feature: Establishing a Secure Cloud Infrastructure with Dynamic Authorization

By David Brossard for CloudPOST Today, it is imperative for businesses to increase scalability and enable collaboration among development teams to help solve complex challenges, all while cutting down on IT business costs. To accomplish this daunting task, more and more organizations are shifting their entire IT infrastructure to the cloud and adopting a “cloud everything” […]

DZone Feature: The Journey Toward Securing the Cloud

by Gerry Gebel for DZone.com If you are in the process of moving to the cloud or still in the planning stages, the need to address complex access control cases for cloud-based resources is a must. The migration from on-premise infrastructure to the cloud is underway. Many organizations are actively adopting a cloud-first approach and […]

Securing APIs and Microservices with ABAC, OAuth, and OIDC

Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert to offer comprehensive access control for applications that are built using microservice and API approaches. In this webinar, Gerry Gebel and David Brossard outline a set of examples where security standards work together […]

Authorization Made Simple: Using ALFA, REST, and JSON to Secure Applications

As more companies across all industries develop more applications, the challenge of securing those applications becomes more complex. In this webinar, Jonas Iggbom and David Brossard of Axiomatics discuss how easily authorization can be externalized from your apps, expressed as policies, and enforced consistently using ALFA, XACML, and the Axiomatics Policy Server. Fill out the […]

Build vs Buy for Dynamic Authorization Solutions

When should you consider investing in Dynamic Authorization software versus building your own in-house solution? When evaluating the best approach to securing your APIs, applications, databases, and cloud, organizations are often caught in the decision of building a framework in-house vs. engaging a vendor to help. There are several key advantages to partnering with a […]

CSO Online Feature: Why You Need Both Authorization and Authentication

How to effectively manage IAM controls to secure critical assets by Gerry Gebel In previous posts I have discussed in depth the importance of authorization, specifically dynamic authorization, to control access to critical information assets. However, authorization is only a portion of the access control equation, another piece that organizations require is the authentication step […]

Technical Viewpoint: Protecting Microservices and APIs with ABAC, OAuth, and OpenID Connect

Attribute Based Access Control (ABAC), OAuth 2.0 and OpenID Connect (OIDC) are complementary standards that can be used individually or in concert to offer comprehensive access control for applications that are built using microservice and API approaches. This document outlines a set of examples where security standards work together in addressing requirements that are difficult […]

Streamline Access Control with Federated Identity and ABAC

Enterprises are pained by legacy access control approaches. They are looking to achieve better access control management and consistency along with strong audit control and ease of record keeping and archiving. But the challenges are many: Lines of business have defined their own roles for access. Silos in the organization have different models and patterns […]

KuppingerCole Report – Executive View: Axiomatics Policy Server

The Axiomatics Policy Server (APS) has been named among the leading access control solutions for its outstanding features according to KuppingerCole in this Executive View report. Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization’s breadth of access control needs. APS makes available a suite of tools and services to manage […]

CSO Online Feature: Striking a Balance between Customer Experience, Security and Privacy

Everyone is a consumer with Consumer Identity and Access Management (CIAM) by Gerry Gebel, for CSO Online Competitive forces and market dynamics in many industries have led more organizations to focus on digital transformation projects to modernize their applications. A key driver for these projects is improving customer experience. To be successful, organizations must provide […]

DZone Feature: How to Create and Maintain Database Security Using Dynamic Authorization

With organizations now relying so much on data, they should look towards a fine-grained policy-based approach to control access to critical information. By Gerry Gebel We are living in a data-driven world where organizations rely on data for virtually everything. Businesses across every vertical have become reliant on data for day-to-day business operations by collecting […]

ReadITQuik Interviews Niklas Jakobsson, Axiomatics CEO

This week, read Niklas Jakobsson, CEO at Axiomatics talk about security services organizations should use to access data and resources and how the first line of protection should always be based on Attribute Based Access Control (ABAC) – a platform that can turn collaboration into a competitive advantage by enabling individuals within an organization to […]

CSO Online Feature: Using Dynamic Authorization to Navigate GDPR

With less than five months until the implementation of GDPR, organizations are scrambling to comply with the strict data security standards. by Gerry Gebel. This article originally appeared in CSO Online.  The implementation of the General Data Protection Regulation (GDPR) in the EU will impact hundreds of thousands of businesses globally. GDPR imposes a significant […]

DZone Feature | Cybersecurity: The Do’s and Don’ts

In this post, we take a look at what security and dev teams should both do, and not do, to create a security-friendly environment. By Gerry Gebel | Security Zone · Opinion Security is the responsibility of all of us. Given the visibility and public disclosure that results from cyberattack breaches, cybersecurity and enterprise readiness have become […]

Glossary of Terms: Understanding Attribute Based Access Control

This glossary includes terms defined for architecture, services, and key phrases related to Attribute Based Access Control and the Axiomatics Product Suite.

Federal Mission: Applying ABAC to Your Cloud Migration

This Use Case, Federal Mission: Applying ABAC to Your Cloud Migration, is tailored for government agencies, who have some of the most burdensome security requirements. By using an Attribute Based Access Control (ABAC) implementation, such as the Axiomatics Policy Server (APS), for your enterprise’s authorization, you can extend your existing cloud’s capabilities to provide dynamic […]

CSO Online Feature: How Enterprise Security Transformed in 2017 and What Comes Next in 2018

Digital transformation and microservices made up the most impactful trends for the enterprise security industry in 2017, but what will have the biggest impact in 2018? Enterprise security is always evolving, not by choice but because organizations are constantly facing new security threats. As 2018 fast approaches, let’s take a quick look back at how […]

Axiomatics Identifies Transformative Enterprise Security Trends for 2018

DevSecOps, Securely Sharing Data and Regulatory Compliance Highlight the Trends to Watch for Enterprise Security in 2018 CHICAGO (December 13, 2017) – Axiomatics, the leader in fine-grained dynamic authorization, today announced the top enterprise security trends that will have significant ramifications for businesses in 2018 and beyond. The trends were compiled by a panel of security […]

Axiomatics Data Access Filter for Multiple Databases – Product Sheet

Get to the heart of access control, with policy-based authorization applied on the content of relational databases. The Axiomatics Data Access Filter for Multiple Databases derives user permissions from real-time evaluation of policies, and can filter, mask or redact based on these same policies. This data-centric security approach provides the visibility and control required in today’s […]

European Bank Achieves Proactive Data Security, Compliance with ABAC

Executive Summary The primary driver for this project was to achieve compliance with a Personal Data Protection Law and to prepare for future regulatory challenges. In addition, the bank’s authorization was historically domain-specific, meaning policies were defined, governed, and implemented by the application owners only. This approach delivered adequate functionality within silos but no control […]

A Practical Approach to GDPR Requirements

At the time of this webinar, many enterprises are/were finalizing their plans for addressing new requirements of the GDPR directive. GDPR has both a business and a technical impact, which is particularly challenging when the enforcement regime is so unclear at this point in time. In this webinar, experts from EY and Axiomatics discuss the […]

CSO Online Feature: Managing DevOps with Dynamic Authorization

Security technologies, like Dynamic Authorization, are an integral part of the devops methodology and should be managed in the same manner as the application itself. by Gerry Gebel In today’s on-demand and fast-changing global economy, consumers expect companies to deliver and update products and services rapidly. Many organizations have turned to a devops methodology to […]

Fortune 500 Transportation Company Simplifies Access Control for 175,000 Users

One of the largest freight transportation companies in the world, with over 50,000 employees, stores and manages data with access in mind for over 175,000 user accounts. Over the past 50 years, the company has solved difficult technical problems for this population with innovative, forward-thinking solutions. With time however, the company had outgrown its systems, […]

KuppingerCole Report – Executive View: Axiomatics Data Centric Security

KuppingerCole’s Executive View reports offer advice to IT professionals looking for data-centric security. In the October 2017 report, Axiomatics’ data-centric dynamic authorization suite is profiled. The report sheds light on two flagship products: Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control […]

Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture – Using ABAC for APIs and Microservices

As opposed to traditional monolithic applications, a (micro)service-based architecture comprises multiple loosely coupled modules (“services”) that serve specific business purposes and communicate over lightweight network protocols. Such services can be developed, deployed and scaled independently on different platforms, which greatly reduces the time needed to bring as new product to market and allows for continuous […]

Empower the New Identity Architecture: Combine a Federated Identity Service with Attribute Based Access Control (ABAC)

In today’s complex identity infrastructures, flexibility has become an essential requirement. The rise of cloud-based platforms, SaaS applications along with other industry trends such as Internet of Things (IoT), and Big Data has added to the number of distributed identity silos that enterprises must manage. Implementing fine-grained access control across a wider array of sensitive […]

EY Digital Identity and Access Management Report

As organizations shift business strategies towards new digital channels to maintain a competitive advantage, and consumers become increasingly reliant on multiple device connections, cybersecurity threats are becoming more prolific and more sophisticated than ever before. Cybersecurity is no longer about prevention, but rather about detection and readiness for the inevitable. And everyone, from boardroom to […]

CSO Online Feature: Enhancing API Security, Dynamic Authorization to Protect Sensitive Data

Enhancing API Security: Dynamic Authorization to Protect Sensitive Data (September 11, 2017) Axiomatics’ Gerry Gebel featured in CSO Online API Gateways effectively manage the authentication of the user and provide service orchestration capabilities, but if sensitive data is involved, additional fine-grained authorization capabilities are required. Digital transformation continues to be a priority as organizations realize […]

6 Alarming Facts About Electronic Health Records

One of the most difficult issues for a CIO to tackle is the ability to know who has access to what critical data and why. In the the case of healthcare and insurance providers, Electronic Health Records (EHR) contain even more valuable information than most data sources due to the sensitive and detailed nature of […]

Why Axiomatics Federal?

  As the global independent leader in Dynamic Authorization solutions for Federal Government, our people, expertise, and our best-in-class software set us apart. Agencies come to us to solve complex use cases around access control to applications, databases, Big Data, microservices, and APIs. Through a policy-based approach to dynamic authorization that utilizes the Attribute Based […]

Security Compliance Using Externalized Authorization

Central Decision Point for Fine-grained Access Control: Entitlements Management To effectively comply with various industry regulations, businesses require integrated, cost-effective information risk management solutions that can protect data and manage entitlements over applications. This document offers guidance on conducting an organizational IT risk assessment, and provides a template for determining what type of security controls […]

KuppingerCole Executive View: Axiomatics Policy Management Suite

The Axiomatics Policy Management suite provides a solution for companies wanting to provide fine grained access control to protected resources. This means evaluating a user’s access request, at runtime, against pre-determined policies to either permit or deny the user’s request. Applications then apply the decision. The Axiomatics Policy Suite was featured in this Leadership Compass […]

Why Axiomatics?

As the global independent leader in Dynamic Authorization solutions, our people, expertise, and our best-in-class software set us apart. Customers come to us to solve complex use cases around access control to applications, databases, Big Data, microservices, and APIs. Through a policy-based approach to dynamic authorization that utilizes the Attribute Based Access Control (ABAC) model, […]

Federal Mission: Security Compliance using Externalized Authorization Management (EAM)

United States federal agencies are beholden to myriad regulations and standards, some of the most notable of which are the FIPS Publication 200 and the NIST Special Publication 800-53. Both documents, in combination, “ensure that appropriate security requirements and security controls are applied to all federal information and information systems.” These documents offer guidance on […]

The State of Data Centric Security

Data-centric security signifies a new generation of database security techniques, based on a combination of robust and proven technologies: contextual data filtering, dynamic data masking and standards-based Attribute Based Access Control (ABAC). Check out our infographic on the case for data-centric security.

Solving New Collaboration, Security, Cloud and Mobilization Challenges in the Energy Sector

Discover how companies in the power and utilities sectors can use attribute based access control to safeguard and securely share sensitive data within their ecosystems.

Webinar: Externalized Dynamic Authorization in a [Micro]Services World

Externalized Dynamic Authorization in a [Micro]Services World Key Takeaways: Enforcing authorization on the response leg to incorporate characteristics of the resources being protected Utilizing scopes only for what they were intended: delegated consent Filtering data at the Policy Enforcement Point Deploying authorization services as a microservice Fill out the form below to view this webinar.

What is Attribute Based Access Control?

Protect Critical Assets and Enable Information Sharing What is Attribute Based Access Control? Access control has gone beyond simply need-to-know to include need-to-share authorization. Traditionally, the focus of authorization and access control has been on building barriers to sensitive data and only making it available to a select few. But that’s changed as companies want […]

Protect Critical Data and Enable Collaboration with ABAC

Access control has evolved to meet the changing security challenges organizations face in the digital age. Attribute Based Access Control, known in brief as ABAC, is quickly becoming the standard model for organizations confronted by the need for a robust and flexible solution to today’s increasingly complex security demands. Download the PDF to learn more […]

How ABAC fits into an IAM Framework

IAM teams are finding that Attribute Based Access Control is key to meeting regulatory and compliance requirements. ABAC is an access control approach that is recommended by NIST and discussed in their Guide to Attribute Based Access Control (ABAC) Definition and Considerations (NIST Special Publication 800-162) document. With ABAC, the use of subject, environment, and […]

The Basics of Attribute Based Access Control (ABAC)

Traditionally, the focus of authorization and access control has been on building barriers to sensitive data and only making it available to a select few. But that’s changed as companies want to get more from their data and make it really work for them. Authorization is now about facilitating user access to the right data […]

Data-centric Security for Pharmaceuticals – Executive Summary

Providing the right stakeholders with unobstructed access to sensitive data is essential in any industry. Within the pharmaceutical and biotech industries, inefficient data sharing and collaboration slow down the research process and delay the launch of new products. However implementing an effective data share approach can be extremely complex through a combination of business, security, privacy and regulatory […]

Axiomatics Primer: OAuth and OpenID Connect

Learn how to approach applying Externalized Dynamic Authorization to an API and/or microservices architecture that uses OAuth 2.0 flows and/or OpenID Connect (OIDC), with this Axiomatics Primer on the basics of OAuth and OpenID Connect.

Why Externalized Authorization? (for Federal Government)

“What will my organization gain from externalized authorization?” It’s a question our team hears often. Axiomatics understands our dynamic world that requires organizations to be more responsive. Typically, information and application access policies are hard coded into the application. That requires many months of coding efforts and man hours to make any policy changes, which no […]

Why You Should Externalize Your Authorization

“What will my organization gain from externalized authorization?” “Will our performance suffer?” “My team enjoys the challenge of writing their own code.” Axiomatics understands our dynamic world that requires organizations to be more responsive. Typically, information and application access policies are hard coded into the application. That requires many months of coding efforts and man hours […]

Axiomatics Dynamic Authorization

Unified Dynamic Authorization: Enterprise Access Control, Anywhere, anytime.  Axiomatics provides externalized authorization through attribute and policy-based access control for applications, databases, Big Data, APIs and microservices. As the premier vendor in authorization, Axiomatics solutions are ideal for enterprises and government agencies that need to securely share information, while complying with complex and ever-evolving regulations. The Axiomatics […]

(Big) Data Security: Protecting Information at the Source

With the growing adoption of cloud computing, Big Data or open APIs, managing, securing and sharing massive amounts of digital data across heterogeneous and increasingly interconnected infrastructures is becoming increasingly difficult. From file servers to relational databases and big data frameworks, to the Internet of Things and entire API ecosystems – each data model imposes […]

Extending CA Single Sign-On with XACML Capabilities

Axiomatics CA Validated extension for CA Single Sign-On leverages Single Sign-On’s existing authorization capabilities and allows users to implement risk-intelligent policies that adapt with an organization’s changing IT environment. When used in combination, the solutions enable organizations to implement data governance with standards-based policies that control SOA and WAM. The CA Single Sign-On product is […]

Federal Mission: Dissemination and Information Sharing using ABAC

Law enforcement, defense, and intelligence agencies are under the obligation to securely share as much information as possible within their respective communities. The keyword here is “securely.” It is oftentimes the aggregate of data that provides actionable information to help agencies carry out their missions.  But how can an information owner share her data in […]

KuppingerCole Leadership Compass 2014

The Axiomatics Policy Server was featured in this Leadership Compass from KuppingerCole, by analyst Graham Williamson: Dynamic Authorization Management: Leaders in innovation, product features, and market reach for Dynamic Authorization Management. Your compass for finding the right path in the market. Axiomatics provides a sophisticated policy management environment. It divides policies into domains and allows a […]

KuppingerCole Executive View: Axiomatics Data Access Filter

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes. This Executive View from analyst firm […]

Five Ways to Prepare for an ABAC Program

As adoption of a policy-based approach to access control using ABAC becomes more widespread, organizations are faced with the challenges of how to prepare for a deployment: to ensure speed-to-market, enterprise-wide adoption and ROI achievement. Check out this guide to the five areas to consider in preparing for ABAC in your organization.

Federal Government: Five Ways to Prepare for an ABAC Program

Agencies within the federal government are beginning to adopt a policy-based approach to access control using ABAC. In this process, agencies are faced with the challenges of how to prepare for a deployment: to ensure speed-to-market, enterprise-wide adoption and ROI achievement. Check out this guide to the five areas to consider in preparing for ABAC […]

SmartGuard® for Data – Data Sheet

SmartGuard for Data from Axiomatics protects big data stores against unauthorized access and exfiltration of data; only allowing authorized users or applications to access the data they’re authorized to see, at the right time, under the right conditions. This data sheet outlines the technical specs and requirements for this product, including the Spark SQL Edition. […]

Authorization for Big Data: Introducing SmartGuard

Safeguard Information Assets with SmartGuardTM for Big Data We are seeing a strong, impressive adoption pace of Big Data systems within enterprises. Primarily driven by the various business and technical insights derived from the use of these systems, they depend on the quantity and quality of data and information captured in them. As more sensitive […]

Danish Defence – A Secure Solution for Sharing Information Electronically

A joint project with Axway, Axiomatics and Sopra Steria, this case study outlines the Danish Defence project. A secure solution forexposing APIs to send and receive information between their secure network and e-Boks. The solution also had to enable Danish Defence to communicate with other trusted third-party vendors, automate their processes, and sharply reduce costs. Read this case study […]

Axiomatics Back to Basics: ABAC 101

The benefits of Attribute Based Access Control (ABAC) for your organization. Attribute Based Access Control is the most robust, flexible and fine-grained solution that is ideal for access control challenges faced by today’s organizations. In this webinar, we’ll go back to the basics of ABAC. Key takeaways: Key elements of the ABAC approach Importance of policy […]

Federal Government: How ABAC fits into an IAM Framework

IAM teams in the federal government are finding that Attribute Based Access Control is key to meeting regulatory and compliance requirements. ABAC is an access control approach that is recommended by NIST and discussed in their Guide to Attribute Based Access Control (ABAC) Definition and Considerations (NIST Special Publication 800-162) document. With ABAC, the use […]

Axiomatics Boot Camp: Spring Security and ABAC

To enable the use of fine-grained Attributed Based Access Control (ABAC) model within the Spring framework, Axiomatics introduced the XACML PEP SDK for Spring Security. In this refresher webinar, we cover the basics of the integration and go into the details of what has changed, and been enhanced in the SDK, based on direct customer feedback […]

The Evolution of RBAC Models to Next-Generation ABAC

The management and administration of roles to set permission for access control have become challenging enterprises of all sizes. In this whitepaper, you’ll learn why Role Based Access Control is becoming unmanageable (called “role explosion”), and why this legacy access control mechanism must evolve. Enter ABAC. ABAC builds upon existing roles, and expands the range […]

Attribute Based Access Control for Manufacturing

Attribute Based Access Control for Manufacturing Manufacturers around the globe are faced with the growing risk of breaches – in many cases the attackers are after IP and sensitive customer data. Using an Attribute Based Access Control approach can help balance the need to protect these critical assets, while facilitating collaboration through the sharing of […]

Toxic Pairs, Role Explosion, and the Evolution of RBAC

A Practical Guide for Fine-Grained Access Control It’s 2016 and the days of Sherlock Holmes are long gone. Yet mysteries and puzzles abound more than ever in our increasingly complex world. IT is no stranger to these complexities. Managing access control and entitlements has become an impossible task where role-based access control has failed us […]

Proving Compliance throughout the ABAC Lifecycle

One of the benefits of Attribute Based Access Control is the ability to fine-tune compliance checks and balances in real time, and make changes to policies to meet compliance in an immediate, centralized way. What’s even more complex is proving compliance, especially when it comes to showing access control permissions in real-time. The full-circle management of […]

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

A Webinar with Axiomatics and IAM Analysts KuppingerCole: Take me to recording Join Axiomatics and leading analyst firm KuppingerCole to learn more about Attribute Based Access Control (ABAC). ABAC solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments […]

Vital Authorization Add-ons – Reporting, auditing and access review for Axiomatics Policy Server and Data Access Filter

This product sheet highlights the reporting, auditing and access review add-ons we provide.

Axiomatics Review Manager

Enforcing complex and changing regulations is a continuous challenge for enterprises and federal agencies; it’s a costly and time-consuming activity that requires ongoing diligence. The first part is achieving compliance – but the ongoing need is the right reporting to prove safeguards are in place. For organizations that have already adopted Attribute Based Access Control (ABAC) the challenge of regulatory […]

Axiomatics Review Manager Product Sheet

Enforcing complex and changing regulations is a continuous problem for enterprises and federal agencies. It is both a costly and time-consuming activity that requires ongoing diligence to achieve compliance – and reporting to prove the right safeguards are in place. For organizations that have already adopted Attribute Based Access Control (ABAC) the challenge of regulatory […]

The CISO’s Guide to Planning for ABAC Success – with Guest Speakers from Security Architects Partners

A webinar with Axiomatics and Security Architects Partners Axiomatics and Security Architects Partners present this session on the components for a successful transition from legacy access control models, such as Role-based Access Control, to one that enables dynamic authorization. Attribute Based Access Control, known as ABAC, is the new model for access control as identified by NIST […]

Delivering Fine-Grained Authorization Today by Leveraging a Federated Identity Service and ABAC

A webinar with Axiomatics and Radiant Logic View the recording here: http://www.radiantlogic.com/learning-center/events/webinars/webinar-3312016/ A recent Gartner report predicts that by 2020, 70% of organizations will use Attribute-Based Access Control (ABAC) to protect critical assets, up from 5% today. We all know that ABAC—for fine-grained authorization, externalized and standards-based representation of policies—is the way to go. Along the way, […]

How Top Banks Use an Attribute-Based Approach (ABAC) to Protect PII, Critical Assets, and Meet Regulations

Find out why Attribute Based Access Control is the solution for the world’s leading banks and financial institutions. As demands for better online services– from customers, staff and third parties – escalate, so too do the number and complexity of regulations. The list of requirements is many: FFIEC, FRB, FDIC, OCC, NCUA, CFPB, ACSSS to […]

Making a Business Case for Attribute Based Access Control (ABAC)

Cut Costs, Streamline Access Control and Achieve Compliance. Are you looking to shift your access control approach to handle today’s complex IT environment? Or maybe you’re find you’re already spending too much time and money managing access control and it’s not meeting your security expectations? In fact, we see many security architecture teams across the Fortune […]

Healing Data Leakage in the Modern Health Care Environment

The move to electronic records (EHR) in the health care industry – across providers, insurance companies and a multitude of third parties – has increased the speed of sharing records, and in theory, the quality of care provided to individuals. However, this instant-access ecosystem also introduces increased risk – as the more users that have […]

Axiomatics Boot Camp: ABAC and XACML Made Easy – Using ALFA to Write Fine-Grained Authorization Policies

Does the promise of attribute-based access control sound like magic? Don’t worry, you don’t need to be a wizard to write efficient and secure ABAC policies. In this bootcamp webinar, we will show you how you can easily write ABAC policies straight from within your IDE by using ALFA, the Abbreviated Language for Authorization. We […]

Building Love and Compatibility between RBAC and ABAC

As legacy data access control models such as Role Based Access Control begin to break down, industries are moving to the next generation of access control: Attribute Based Access Control (also known as “ABAC”). Some experts say these two models are at odds, and to move properly, enterprises need to “rip and replace” to a […]

Joint webinar with Axway – Protecting Your Data Beyond the Enterprise with Fine Grained Access Control for APIs and Data

Please join Axiomatics and Mark O’Neill, VP of Innovation at Axway, as we discuss the role that fine grained access control plays in securing APIs and the data that flows through them. We will share best practices for deploying an API Gateway coupled with a powerful and flexible Policy Server to deliver scalable security with […]

New Years Detox – Eliminating Toxic Combinations in your Access Control

As access control has become more complex, the assignment of roles has exploded out of control, making it harder to eliminate toxic combinations of roles that end up allowing access that should actually be denied. For example, the same person entering a trade should not be allowed to confirm it as well, as this can lead […]

Axiomatics Data Access Filter – Next Generation Data-Centric Security

This whitepaper introduces the Axiomatics Data Access Filter product family. The data access filtering approach represents a new generation of database security techniques, based on a combination of two robust and proven technologies: data-centric security and standards-based Attribute Based Access Control (ABAC). In this context, Axiomatics defines Data Access Filtering as the ability to apply access policies […]

Centralizing the Code – Separating Authorization Logic from Apps

For any business in the Fortune 1000 – such as health care, insurance, banking, pharmaceuticals and manufacturing – the need to shift beyond legacy role-based access control models becomes more immediate with every data breach. There’s one trend that’s crossing industries – separating hard-coded authorization logic from applications: externalizing authorization and using a policy-based approach […]

KuppingerCole Executive View Axiomatics Data Access Filter

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes. This Executive View from analyst firm […]

Safe Harbor: The New Privacy Challenges

Now that Safe Harbor agreement has been deemed invalid global organizations with employees and customers in Europe face new data privacy challenges. To meet compliance and cope with ongoing regulation changes, authorization needs to be dynamic. Protecting PII and upholding business agility requires fine-grained access control of citizens’ data.

Axiomatics Boot Camp – Managing Multiple Projects for Policy Authoring and Deployment

When using an Attribute Based Access Control approach, enterprises have varying requirements for segregation of an access control policy authoring and deployment architecture. These typically reflect their internal governance and compliance rules. For example, an enterprise may mandate that an employee associated with a specific department should not be able to view, much less edit, […]

Axiomatics Extension for CA Single Sign-On

This product sheet explains how the Axiomatics Extension for CA Single Sign-On delivers dynamic authorization for web access management by enforcing user permissions based on corporate policies and regulations.

Axiomatics Policy Auditor

The Axiomatics Policy Auditor (APA) with Prover Plug-In1 delivers a platform for auditors and IT administrators to analyze and audit eXtensible Access Control Markup Language (XACML) policies within an organization. Designed with business users in mind, the APA simplifies the task of auditing security policies by allowing its users to: Verify compliance of XACML policies. […]

Axiomatics Integration for CA API Gateway

APIs have revolutionized the way that application data can be accessed. The richness they offer enables organizations to cater for today’s modern way of communicating in a way that simply isn’t possible with a stand-alone legacy system approach. APIs have now become a prerequisite if you want a flexible and scalable system that can provide […]

Axiomatics Data Access Filter for Multiple Databases – Data Sheet

The Axiomatics Data Access Filter applies access policies to database requests, thereby ensuring that only authorized individuals are allowed to read and write data, and to further protect this data by dynamically masking or redacting it so that sensitive data is never exposed. Get the technical details on how the product works and the system […]

XACML Experts Panel Discussion

Everything you ever wanted to know about XACML but were afraid to ask. This panel discussion features our three top experts for the XACML language. Gerry Gebel, President Americas Erik Rissanen, CTO and Author of the standard David Brossard, VP of customer relations These three compelling points of view will provide guidance on using XACML and […]

API Authorization – Secure Sensitive Data with Attribute Based Access Control

In this session we have invited a very special guest speaker, Anderson Gray from CA Technologies for a look at the growth of APIs, trends, the use of API gateways and the need for more fine-grained access control. APIs have revolutionized the way that application data can be accessed, shared and monetized. But data must […]

Axiomatics Boot Camp 101 – Filter Sensitive Data at the Database Layer and Keep it Secure

With so much rich, valuable data stored in databases, they are constantly targeted and too often breached. By dynamically filtering and masking data at the row, column and cell level, enterprises can ensure the user only sees that data which they are authorized to access. In this webinar IT security experts David Brossard and Srijith […]

From Static Roles to Dynamic Attribute-Based Authorization

This is a joint webinar together with analyst firm KuppingerCole. The webinar is hosted on KuppingerCole’s website.  Take me to the webinar Dynamic authorisation systems complement or replace the rigid role concepts through direct implementation of business-driven authorisation rules in the form of policies, and they make decisions about the access of employees, partners, and […]

Axiomatics Bootcamp 201 – Using JSON and REST Profiles for External Authorization

JSON and REST are widely used to implement lightweight and fast web services. This Axiomatics Boot Camp session will provide technical insight into using these XACML profiles for externalized authorization. This is a prime session if you’re a developer or architect and are looking to adopt Attribute Based Access Control. Key takeaways: What is Attribute […]

Getting the OWASP Top Ten Right with Dynamic Authorization

The non-stop drum beat of data breaches and non-stop security issues show that a new approach to security is required writ large. Application security can be improved through fine-grained, dynamic access control. However not all application security issues are best solved with classic access control schemes. Attackers are intelligent and adaptable. For them, the access […]

Meeting Health Care Privacy Regulations with Attribute Based Access Control

Personally Identifiable Information (PII) with related sensitive health care data is increasingly being maintained in electronic records. This means PII data can be made available, reproduced and transferred with more ease than ever before. Legislation in many countries is being adapted to secure trust in institutions, to meet the confidentiality and privacy concerns that are […]

The Identity & Access Management (R)evolution

Ready to evolve your access control to meet new complexities? Many organizations are currently striving to develop new strategies in their IAM vision and roadmap planning. While investments that are already in place need to be leveraged, organizations look for IAM capabilities that will make them more agile and responsive to change requests. This paper […]

Shifting to Attribute Based Access Control

No longer is a company’s data restricted by the boundaries imposed by physical office space and a local area network. Data sharing and collaboration transcend organizational borders and older models of access control cannot keep pace. They simply fail, and often with disastrous results. The static assignment of user permissions either directly or by way […]

Adding Fine-Grained Authorization to CA Single Sign-On

The Axiomatics Extension for CA Single Sign-On uses the Authorization API to seamlessly insert XACML capabilities into the product to add fine-grained authorization capabilities. Read more about how to add this integration on to your CA Single Sign-On installation. Key Takeaways: How the Axiomatics Extension for CA Single Sign-On allows you to combine Single Sign-On’s […]

Increasing the Value of Information with Fine Grained Security for Data Marts

Knowledge intensive industries, such as Pharma, Banking, Insurance, Media and Energy, increasingly rely upon timely access to integrated information for innovation and product development, as well as the marketing of new products and services. Critical decision making processes within these industries are based at least in part upon the value proposition that providing more stakeholders […]

Getting Started With Attribute Based Access Control

Implementation of an Attribute Based Access Control (ABAC) system is accomplished by the completion of three main task groups: Policy Modeling Attribute Sourcing Application Integration By orchestrating these three activities, organizations can effectively deploy an ABAC system and begin taking advantage of a more secure, flexible and business-driven approach to data sharing, to securing critical resources, and to […]

Enforcing Segregation of Duties

About Enforcing Segregation of Duties White Paper IT organizations have struggled to identify potential Segregation of Duties (SoD) violations within their IT systems. A violation of this kind occurs if a user is given permissions which combined can be used to subvert a business critical process or in other ways cause harm in breach of […]

Patient Data Privacy for eHealth Services

The Center for eHealth in Sweden coordinates the efforts of county councils and regions in the establishment of national eHealth services. Within this framework, the Swedish national healthcare security infrastructure “BIF” is maintained. The overall objective is to provide a secure infrastructure to meet patient privacy requirements while granting authorized care providers access to the […]

The Key to API Security

This solution brief is an overview on how Attribute-Based Access Control (ABAC) brings security and agility to the API infrastructure. APIs have revolutionized the way we exchange data and have become the preferred method for exposing data to external parties. However, APIs that handle sensitive data pose security and data access control threats, and therefore […]

Financial Services Industry Brief

Is it possible to protect access to sensitive information and secure financial transactions without sacrificing business agility? It is with dynamic authorization and policy-driven access control. Leading financial institutions around the world are shifting to Attribute Based Access Control (ABAC) to get this balance right. ABAC helps them meet the authorization demands of the modern […]

Manufacturing: The Essential Guide to Sharing and Securing Sensitive Data

Global industries depend on information sharing across the borders of nations and jurisdictions. Intellectual properties are at stake and export control compliance is non-negotiable. An obvious business case for XACML. Intellectual Property Control Profile simplifies access controls for the protection of copyright, trademarks, patents and trade secrets. Compliance with export control regulations can only be […]

Insurance Industry Brief

Insurance companies go to market via agents and agents of agents. Clients expect efficient and secure online services. Authorities demand strict regulatory compliance. Attribute Based Access Control (ABAC) keeps everyone happy. In 1768, Captain Cook took out a policy on his modest home near Assembly Row off London’s Mile End Road. The house was covered […]

CSS Insurance – Onboarding New Authorization Tasks

Having tested various solutions to resolve authorization issues with their corporate document management system, CSS Insurance turned to the Axiomatics Policy Server (APS) to deliver effective Attribute Based Access Control. As the fine-grained, context-aware authorization tool had already been deployed to ensure compliance with newly introduced healthcare reporting regulations, the challenge was to increase the scope […]

Swiss Re – User Permisson Management

The insurance sector is highly regulated. Sensitive information must be protected in compliance with regulations, with as little impact on business as possible. At the same time compliance with regulations has to be proven to auditors. Key to this is managing and enforcing user permissions to information. However, in many organizations legacy IT systems and […]

Cross Border Privacy Enforcement – Global Financial Services and the Data Flow Challenge

Privacy regulations impact cross-border transactions in the financial services industry. Domestic processing of personally identifiable information (PII) and the transfer thereof for storage or processing outside the country’s jurisdiction are scenarios with different regulatory mandates. This business case brief will highlight the challenges and solution to secure information and to be compliant with regulations. Key […]

Axiomatics Bootcamp ABAC 101

This “bootcamp” style webinar provides a basic overview of Attribute Based Access Control (ABAC) and how it helps solve complex data access control challenges. Enterprises and government agencies are making the shift to ABAC to help tackle specific use cases – including compliance with privacy laws, enabling inter-government agency collaboration, reduction of data leakage, combating […]

Beyond Database Security

This is a joint webinar together with analyst firm KuppingerCole. Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues. The more information is available to and shared with those who […]

Enhancing Spring Security

Spring Security provides authentication, basic authorization and other security features for the widely used Java application framework Spring and it is a popular choice for use in the development of enterprise applications. It also provides an elegant way to cross-cut security concerns across various layers of the application, typically business and presentation tiers. In this […]

Overcoming Role Explosion Challenges with Attribute-Based Access Control

Access control has been predominantly managed with a legacy static model based on user roles – called “Role-based Access Control”, or RBAC. Enterprises that use RBAC are now experiencing role explosion – and difficulty scaling RBAC to meet the complex access control requirements of today’s workforce and the need to share, securely. Key Takeaways: Understanding an […]

Cutting Through Export Control with Bell Helicopter and Axiomatics

In this webinar, together with guest speaker Greg Heartsfield from Bell Helicopter, we will focus on the complexity of export control and PLM systems and the challenge of overseeing data classification schemes subject to change. Because PLM systems were designed to help collaboration across departments and external parties, these systems require fine-grained authorization to make […]

Flexible and Dynamic Security for the Data-Centric Enterprise

Requirements for securing data often pass down from C-level executives through multiple layers: from security architects out to the teams and systems administrators responsible for implementing security requirements. At each step, different tools are used to achieve the objectives, making it difficult to trace the security configuration back to the original requirements. This results in […]

Enabling ABAC on APIs

Axiomatics attended the annual partner and customer conference Axway Connections at the prestigious Silverstone F1 circuit in Northamptonshire. Our VP of Customer Relations, David Brossard, held a session on enabling ABAC on APIs. View his presentation here. Highlights at the conference included: Customer Successes & Learnings Guest Speaker: A Perspective on the Digital Opportunity Governing the […]

Access Control Obstacles – How to Win the Challenge of IT vs. Business Units

Attribute Based Access Control (ABAC) may be the future of identity and access management (just ask analysts Gartner and KuppingerCole) but up until now there have been certain obstacles. In the main these are non-technical – and they are now being overcome. With the launch of the Axiomatics Policy Server 6.0, Axiomatics is bridging the […]