Securing Critical Enterprise Applications and APIs with Dynamic, Risk-based Authorization and Governance

Until now, Identity Governance and Administration (IGA) and ABAC tools have largely been deployed and operated independently of each other. However, there is significant value in describing and implementing a set of use cases where integrations between IGA and ABAC systems can be accomplished to further ensure best-in-class IAM. Growing customer requirements are the key […]

CSO Online Feature: Securing Continuous Deployment for Applications in the Cloud

Container orchestration tools lack the necessary security controls but attribute based access control (ABAC) can help by Gerry Gebel Application containers have quickly gained popularity as businesses continue to build and deploy applications in the cloud or on-premise. In fact, according to a recent study conducted by 451 Research, application containers will be a $2.7 billion […]

CloudPOST Feature: Establishing a Secure Cloud Infrastructure with Dynamic Authorization

By David Brossard for CloudPOST Today, it is imperative for businesses to increase scalability and enable collaboration among development teams to help solve complex challenges, all while cutting down on IT business costs. To accomplish this daunting task, more and more organizations are shifting their entire IT infrastructure to the cloud and adopting a “cloud everything” […]

Build vs Buy for Dynamic Authorization Solutions

When should you consider investing in Dynamic Authorization software versus building your own in-house solution? When evaluating the best approach to securing your APIs, applications, databases, and cloud, organizations are often caught in the decision of building a framework in-house vs. engaging a vendor to help. There are several key advantages to partnering with a […]

Protect Critical Data and Enable Collaboration with ABAC

Access control has evolved to meet the changing security challenges organizations face in the digital age. Attribute Based Access Control, known in brief as ABAC, is quickly becoming the standard model for organizations confronted by the need for a robust and flexible solution to today’s increasingly complex security demands. Download the PDF to learn more […]

Bell: Cutting through the Code to Meet Export Control Regulations

When Bell realized the scale required to develop an in-house access control system to manage strict export regulations, the decision was made to look externally, and enlist a proven vendor solution. Axiomatics served up what was needed: Dynamic Authorization with Attribute Based Access Control (ABAC) for sensitive and regulated data, throughout the entire enterprise. The […]

KuppingerCole Leadership Compass 2014

The Axiomatics Policy Server was featured in this Leadership Compass from KuppingerCole, by analyst Graham Williamson: Dynamic Authorization Management: Leaders in innovation, product features, and market reach for Dynamic Authorization Management. Your compass for finding the right path in the market. Axiomatics provides a sophisticated policy management environment. It divides policies into domains and allows a […]

The Evolution of RBAC Models to Next-Generation ABAC

The management and administration of roles to set permission for access control have become challenging enterprises of all sizes. In this whitepaper, you’ll learn why Role Based Access Control is becoming unmanageable (called “role explosion”), and why this legacy access control mechanism must evolve. Enter ABAC. ABAC builds upon existing roles, and expands the range […]