Webinars
Controlling Access to Business-Critical Data
In this webinar, Axiomatics experts reveal how to use dynamic authorization to secure the content of data stores. Data on its own, in its own silo, has little value. Once collected, centralized, mined, and analyzed, it can reveal many insights about businesses, customers, trends, etc.; but to do so, access needs to be allowed to many […]
Webinars
Authorization that Scales to the Cloud and Beyond
Companies are leveraging cloud native capabilities such as storage, orchestration, and compute to deliver value to their business; and much of net new application development now takes place in the cloud at a faster pace than ever before. We see the proliferation of more services, more users, and more data which all translate to more […]
VMblog shares Axiomatics 2019 Predictions: Data Security
2019 Modern Data Center Technology Prediction Series Industry executives and experts share their predictions for 2019. Gerry Gebel, our VP of Business Development, contributed this article as part of the 11th annual VMblog.com series exclusive. Data Security As new security threats emerge and threaten sensitive customer information, businesses must develop new procedures and adopt modern […]
IT Pro Portal:Critical Data Security Trends for 2019 and beyond
An article by Gerry Gebel in www.itproportal.com; IT Pro Portal covers the Critical Data Security Trends for 2019 and beyond. It originally appeared here. Critical data security trends for 2019 and beyond Let’s take an in-depth look into the trends we expect to shape the data security landscape next year. Enterprise security is rapidly evolving […]
CloudPost: Seven Big Data Security Trends of 2019
2018 was a monumental year for cloud technologies and data security. As businesses moved application workflows to the cloud, they were forced to manage new data security challenges to balance a new modern hybrid data storage model that combines both cloud and on-premise infrastructures. An article in CloudPost By Gerry Gebel, Vice President of Business Development […]
In The News
DZone Feature: How to Create and Maintain Database Security Using Dynamic Authorization
With organizations now relying so much on data, they should look towards a fine-grained policy-based approach to control access to critical information. By Gerry Gebel We are living in a data-driven world where organizations rely on data for virtually everything. Businesses across every vertical have become reliant on data for day-to-day business operations by collecting […]
Tutorials
SmartGuard® for Data Demo
The security risk of data stores is emerging as a threat, and data breaches will be bigger than ever – with even more data at stake. Privacy issues are compounded, and legacy access control issues just get bigger: -Role explosion with one dimensional role-based systems -Inability to capture complex policy requirements, such as segregation of […]
Analyst Reports
KuppingerCole Report – Executive View: Axiomatics Data Centric Security
KuppingerCole’s Executive View reports offer advice to IT professionals looking for data-centric security. In the October 2017 report, Axiomatics’ data-centric dynamic authorization suite is profiled. The report sheds light on two flagship products: Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control […]
Infographics
The State of Data Centric Security
Data-centric security signifies a new generation of database security techniques, based on a combination of robust and proven technologies: contextual data filtering, dynamic data masking and standards-based Attribute Based Access Control (ABAC). Check out our infographic on the case for data-centric security.
Webinars
Authorization for Big Data: Introducing SmartGuard
Safeguard Information Assets with SmartGuardTM for Big Data We are seeing a strong, impressive adoption pace of Big Data systems within enterprises. Primarily driven by the various business and technical insights derived from the use of these systems, they depend on the quantity and quality of data and information captured in them. As more sensitive […]