Controlling Access to Business-Critical Data

In this webinar, Axiomatics experts reveal how to use dynamic authorization to secure the content of data stores. Data on its own, in its own silo, has little value. Once collected, centralized, mined, and analyzed, it can reveal many insights about businesses, customers, trends, etc.; but to do so, access needs to be allowed to many […]

Authorization that Scales to the Cloud and Beyond

Companies are leveraging cloud native capabilities such as storage, orchestration, and compute to deliver value to their business; and much of net new application development now takes place in the cloud at a faster pace than ever before. We see the proliferation of more services, more users, and more data which all translate to more […]

VMblog shares Axiomatics 2019 Predictions: Data Security

2019 Modern Data Center Technology Prediction Series Industry executives and experts share their predictions for 2019. Gerry Gebel, our VP of Business Development, contributed this article as part of the 11th annual VMblog.com series exclusive. Data Security As new security threats emerge and threaten sensitive customer information, businesses must develop new procedures and adopt modern […]

IT Pro Portal:Critical Data Security Trends for 2019 and beyond

An article by Gerry Gebel in www.itproportal.com; IT Pro Portal covers the Critical Data Security Trends for 2019 and beyond.  It originally appeared here. Critical data security trends for 2019 and beyond Let’s take an in-depth look into the trends we expect to shape the data security landscape next year. Enterprise security is rapidly evolving […]

CloudPost: Seven Big Data Security Trends of 2019

2018 was a monumental year for cloud technologies and data security. As businesses moved application workflows to the cloud, they were forced to manage new data security challenges to balance a new modern hybrid data storage model that combines both cloud and on-premise infrastructures. An article in CloudPost By Gerry Gebel, Vice President of Business Development  […]

DZone Feature: How to Create and Maintain Database Security Using Dynamic Authorization

With organizations now relying so much on data, they should look towards a fine-grained policy-based approach to control access to critical information. By Gerry Gebel We are living in a data-driven world where organizations rely on data for virtually everything. Businesses across every vertical have become reliant on data for day-to-day business operations by collecting […]

SmartGuard® for Data Demo

The security risk of data stores is emerging as a threat, and data breaches will be bigger than ever – with even more data at stake. Privacy issues are compounded, and legacy access control issues just get bigger: -Role explosion with one dimensional role-based systems -Inability to capture complex policy requirements, such as segregation of […]

KuppingerCole Report – Executive View: Axiomatics Data Centric Security

KuppingerCole’s Executive View reports offer advice to IT professionals looking for data-centric security. In the October 2017 report, Axiomatics’ data-centric dynamic authorization suite is profiled. The report sheds light on two flagship products: Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control […]

The State of Data Centric Security

Data-centric security signifies a new generation of database security techniques, based on a combination of robust and proven technologies: contextual data filtering, dynamic data masking and standards-based Attribute Based Access Control (ABAC). Check out our infographic on the case for data-centric security.

Authorization for Big Data: Introducing SmartGuard

Safeguard Information Assets with SmartGuardTM for Big Data We are seeing a strong, impressive adoption pace of Big Data systems within enterprises. Primarily driven by the various business and technical insights derived from the use of these systems, they depend on the quantity and quality of data and information captured in them. As more sensitive […]