KuppingerCole Report – Market Compass: Dynamic Authorization Management

The KuppingerCole Market Compass on Dynamic Authorization Management provides an overview of the product or service offerings in selected market segments. The report has profiled Axiomatics Dynamic Authorization Suite, giving the platform hight ratings across all functionalities. The report focuses on the DAM market at rates vendors based on the security, deployment, functionality and usability […]

Information Management: Federal Trends 2020

This article appeared recently in Information Management. Written by Gerry Gebel the Vice president of business development at Axiomatics. Six Data Security Trends and Challenges for Federal Agencies in 2020. Data security is rapidly evolving in the federal sector as new threats and challenges emerge daily. Every year, new devices and technologies emerge that produce […]

VMblog shares Axiomatics 2019 Predictions: Data Security

2019 Modern Data Center Technology Prediction Series Industry executives and experts share their predictions for 2019. Gerry Gebel, our VP of Business Development, contributed this article as part of the 11th annual VMblog.com series exclusive. Data Security As new security threats emerge and threaten sensitive customer information, businesses must develop new procedures and adopt modern […]

Axiomatics Policy Server Product Sheet

The Axiomatics Policy Server is the industry-leading solution to control access to critical applications. Using externalized dynamic authorization, it provides the most efficient policy engine on the market, and the most complete solution available for enterprise-wide roll out of Policy and Attribute Based Access Control (PBAC and ABAC). With on-premise, hybrid and cloud-native capabilities, this […]

IT Pro Portal:Critical Data Security Trends for 2019 and beyond

An article by Gerry Gebel in www.itproportal.com; IT Pro Portal covers the Critical Data Security Trends for 2019 and beyond.  It originally appeared here. Critical data security trends for 2019 and beyond Let’s take an in-depth look into the trends we expect to shape the data security landscape next year. Enterprise security is rapidly evolving […]

CloudPost: Seven Big Data Security Trends of 2019

2018 was a monumental year for cloud technologies and data security. As businesses moved application workflows to the cloud, they were forced to manage new data security challenges to balance a new modern hybrid data storage model that combines both cloud and on-premise infrastructures. An article in CloudPost By Gerry Gebel, Vice President of Business Development  […]

JAXenter: Predictions for the new year – Crucial data security trends and challenges for 2019

2019 has only just begun – what will the year hold? Ring in the new year with tech predictions from the experts. Today, Pablo Giambiagi, Vice President of Strategic Research at Axiomatics dives into the trends and challenges for data security in 2019. Read the article in its entirety here. Predictions for the new year: […]

Insights Success: Axiomatics Feature

Axiomatics: An Independent Leader in Dynamic Authorization Solutions Axiomatics was featured in Insights Success as the leader in dynamic authorization. Read the full article here: Axiomatics: An Independent Leader in Dynamic Authorization Solutions   Headquartered at Stockholm, Sweden, Axiomatics provides access control software that protects the most critical assets of today’s modern enterprises. This includes applications and […]

Dynamic Policy Driven Authorization for Agile Enterprises

Authorization is more relevant than ever. In particular, the pace of technological change argues against the hard-coded access control hierarchies of the past. Business disruptors impact many industries (such as IoT) and force companies to be more agile and proactive (rather than reactive). The new way forward is to choose patterns and technologies that will […]

Granular Access Control for a Complex Business Model

Modernizing Access Control in a B2B2C Organization with Dynamic Authorization The Company needed to securely share data throughout the complex delivery layers of a “B2B2C” model. The Company contracts third party organizations that perform sales, marketing, and product installation. Due to the unique nature of their financing product, The Company’s decision logic, workflow, reporting and […]

Securing Critical Enterprise Applications and APIs with Dynamic, Risk-based Authorization and Governance

Until now, Identity Governance and Administration (IGA) and ABAC tools have largely been deployed and operated independently of each other. However, there is significant value in describing and implementing a set of use cases where integrations between IGA and ABAC systems can be accomplished to further ensure best-in-class IAM. Growing customer requirements are the key […]

KuppingerCole Report – Executive View: Axiomatics Policy Server

The Axiomatics Policy Server (APS) has been named among the leading access control solutions for its outstanding features according to KuppingerCole in this Executive View report. Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization’s breadth of access control needs. APS makes available a suite of tools and services to manage […]

ReadITQuik Interviews Niklas Jakobsson, Axiomatics CEO

This week, read Niklas Jakobsson, CEO at Axiomatics talk about security services organizations should use to access data and resources and how the first line of protection should always be based on Attribute Based Access Control (ABAC) – a platform that can turn collaboration into a competitive advantage by enabling individuals within an organization to […]

CSO Online Feature: Using Dynamic Authorization to Navigate GDPR

With less than five months until the implementation of GDPR, organizations are scrambling to comply with the strict data security standards. by Gerry Gebel. This article originally appeared in CSO Online.  The implementation of the General Data Protection Regulation (GDPR) in the EU will impact hundreds of thousands of businesses globally. GDPR imposes a significant […]

CSO Online Feature: How Enterprise Security Transformed in 2017 and What Comes Next in 2018

Digital transformation and microservices made up the most impactful trends for the enterprise security industry in 2017, but what will have the biggest impact in 2018? Enterprise security is always evolving, not by choice but because organizations are constantly facing new security threats. As 2018 fast approaches, let’s take a quick look back at how […]

Axiomatics Identifies Transformative Enterprise Security Trends for 2018

DevSecOps, Securely Sharing Data and Regulatory Compliance Highlight the Trends to Watch for Enterprise Security in 2018 CHICAGO (December 13, 2017) – Axiomatics, the leader in fine-grained dynamic authorization, today announced the top enterprise security trends that will have significant ramifications for businesses in 2018 and beyond. The trends were compiled by a panel of security […]

European Bank Achieves Proactive Data Security, Compliance with ABAC

Executive Summary The primary driver for this project was to achieve compliance with a Personal Data Protection Law and to prepare for future regulatory challenges. In addition, the bank’s authorization was historically domain-specific, meaning policies were defined, governed, and implemented by the application owners only. This approach delivered adequate functionality within silos but no control […]

A Practical Approach to GDPR Requirements

At the time of this webinar, many enterprises are/were finalizing their plans for addressing new requirements of the GDPR directive. GDPR has both a business and a technical impact, which is particularly challenging when the enforcement regime is so unclear at this point in time. In this webinar, experts from EY and Axiomatics discuss the […]

Fortune 500 Transportation Company Simplifies Access Control for 175,000 Users

One of the largest freight transportation companies in the world, with over 50,000 employees, stores and manages data with access in mind for over 175,000 user accounts. Over the past 50 years, the company has solved difficult technical problems for this population with innovative, forward-thinking solutions. With time however, the company had outgrown its systems, […]

EY Digital Identity and Access Management Report

As organizations shift business strategies towards new digital channels to maintain a competitive advantage, and consumers become increasingly reliant on multiple device connections, cybersecurity threats are becoming more prolific and more sophisticated than ever before. Cybersecurity is no longer about prevention, but rather about detection and readiness for the inevitable. And everyone, from boardroom to […]

6 Alarming Facts About Electronic Health Records

One of the most difficult issues for a CIO to tackle is the ability to know who has access to what critical data and why. In the the case of healthcare and insurance providers, Electronic Health Records (EHR) contain even more valuable information than most data sources due to the sensitive and detailed nature of […]

Security Compliance Using Externalized Authorization

Central Decision Point for Fine-grained Access Control: Entitlements Management To effectively comply with various industry regulations, businesses require integrated, cost-effective information risk management solutions that can protect data and manage entitlements over applications. This document offers guidance on conducting an organizational IT risk assessment, and provides a template for determining what type of security controls […]

KuppingerCole Executive View: Axiomatics Policy Management Suite

The Axiomatics Policy Management suite provides a solution for companies wanting to provide fine grained access control to protected resources. This means evaluating a user’s access request, at runtime, against pre-determined policies to either permit or deny the user’s request. Applications then apply the decision. The Axiomatics Policy Suite was featured in this Leadership Compass […]

Why Axiomatics?

As the global independent leader in Dynamic Authorization solutions, our people, expertise, and our best-in-class software set us apart. Customers come to us to solve complex use cases around access control to applications, databases, Big Data, microservices, and APIs. Through a policy-based approach to dynamic authorization that utilizes the Attribute Based Access Control (ABAC) model, […]

Federal Mission: Security Compliance using Externalized Authorization Management (EAM)

United States federal agencies are beholden to myriad regulations and standards, some of the most notable of which are the FIPS Publication 200 and the NIST Special Publication 800-53. Both documents, in combination, “ensure that appropriate security requirements and security controls are applied to all federal information and information systems.” These documents offer guidance on […]

Solving New Collaboration, Security, Cloud and Mobilization Challenges in the Energy Sector

Discover how companies in the power and utilities sectors can use attribute based access control to safeguard and securely share sensitive data within their ecosystems.

The Basics of Attribute Based Access Control (ABAC)

Traditionally, the focus of authorization and access control has been on building barriers to sensitive data and only making it available to a select few. But that’s changed as companies want to get more from their data and make it really work for them. Authorization is now about facilitating user access to the right data […]

Axiomatics Dynamic Authorization

Unified Dynamic Authorization: Enterprise Access Control, Anywhere, anytime.  Axiomatics provides externalized authorization through attribute and policy-based access control for applications, databases, Big Data, APIs and microservices. As the premier vendor in authorization, Axiomatics solutions are ideal for enterprises and government agencies that need to securely share information, while complying with complex and ever-evolving regulations. The Axiomatics […]

(Big) Data Security: Protecting Information at the Source

With the growing adoption of cloud computing, Big Data or open APIs, managing, securing and sharing massive amounts of digital data across heterogeneous and increasingly interconnected infrastructures is becoming increasingly difficult. From file servers to relational databases and big data frameworks, to the Internet of Things and entire API ecosystems – each data model imposes […]

Bell: Cutting through the Code to Meet Export Control Regulations

When Bell realized the scale required to develop an in-house access control system to manage strict export regulations, the decision was made to look externally, and enlist a proven vendor solution. Axiomatics served up what was needed: Dynamic Authorization with Attribute Based Access Control (ABAC) for sensitive and regulated data, throughout the entire enterprise. The […]

KuppingerCole Leadership Compass 2014

The Axiomatics Policy Server was featured in this Leadership Compass from KuppingerCole, by analyst Graham Williamson: Dynamic Authorization Management: Leaders in innovation, product features, and market reach for Dynamic Authorization Management. Your compass for finding the right path in the market. Axiomatics provides a sophisticated policy management environment. It divides policies into domains and allows a […]

Attribute Based Access Control for Manufacturing

Attribute Based Access Control for Manufacturing Manufacturers around the globe are faced with the growing risk of breaches – in many cases the attackers are after IP and sensitive customer data. Using an Attribute Based Access Control approach can help balance the need to protect these critical assets, while facilitating collaboration through the sharing of […]

Vital Authorization Add-ons – Reporting, auditing and access review for Axiomatics Policy Server and Data Access Filter

This product sheet highlights the reporting, auditing and access review add-ons we provide.

The CISO’s Guide to Planning for ABAC Success – with Guest Speakers from Security Architects Partners

A webinar with Axiomatics and Security Architects Partners Axiomatics and Security Architects Partners present this session on the components for a successful transition from legacy access control models, such as Role-based Access Control, to one that enables dynamic authorization. Attribute Based Access Control, known as ABAC, is the new model for access control as identified by NIST […]

How Top Banks Use an Attribute-Based Approach (ABAC) to Protect PII, Critical Assets, and Meet Regulations

Find out why Attribute Based Access Control is the solution for the world’s leading banks and financial institutions. As demands for better online services– from customers, staff and third parties – escalate, so too do the number and complexity of regulations. The list of requirements is many: FFIEC, FRB, FDIC, OCC, NCUA, CFPB, ACSSS to […]

Healing Data Leakage in the Modern Health Care Environment

The move to electronic records (EHR) in the health care industry – across providers, insurance companies and a multitude of third parties – has increased the speed of sharing records, and in theory, the quality of care provided to individuals. However, this instant-access ecosystem also introduces increased risk – as the more users that have […]

Safe Harbor: The New Privacy Challenges

Now that Safe Harbor agreement has been deemed invalid global organizations with employees and customers in Europe face new data privacy challenges. To meet compliance and cope with ongoing regulation changes, authorization needs to be dynamic. Protecting PII and upholding business agility requires fine-grained access control of citizens’ data.

From Static Roles to Dynamic Attribute-Based Authorization

This is a joint webinar together with analyst firm KuppingerCole. The webinar is hosted on KuppingerCole’s website.  Take me to the webinar Dynamic authorisation systems complement or replace the rigid role concepts through direct implementation of business-driven authorisation rules in the form of policies, and they make decisions about the access of employees, partners, and […]

Meeting Health Care Privacy Regulations with Attribute Based Access Control

Personally Identifiable Information (PII) with related sensitive health care data is increasingly being maintained in electronic records. This means PII data can be made available, reproduced and transferred with more ease than ever before. Legislation in many countries is being adapted to secure trust in institutions, to meet the confidentiality and privacy concerns that are […]

Enforcing Segregation of Duties

About Enforcing Segregation of Duties White Paper IT organizations have struggled to identify potential Segregation of Duties (SoD) violations within their IT systems. A violation of this kind occurs if a user is given permissions which combined can be used to subvert a business critical process or in other ways cause harm in breach of […]

Patient Data Privacy for eHealth Services

The Center for eHealth in Sweden coordinates the efforts of county councils and regions in the establishment of national eHealth services. Within this framework, the Swedish national healthcare security infrastructure “BIF” is maintained. The overall objective is to provide a secure infrastructure to meet patient privacy requirements while granting authorized care providers access to the […]

Financial Services Industry Brief

Is it possible to protect access to sensitive information and secure financial transactions without sacrificing business agility? It is with dynamic authorization and policy-driven access control. Leading financial institutions around the world are shifting to Attribute Based Access Control (ABAC) to get this balance right. ABAC helps them meet the authorization demands of the modern […]

Manufacturing: The Essential Guide to Sharing and Securing Sensitive Data

Global industries depend on information sharing across the borders of nations and jurisdictions. Intellectual properties are at stake and export control compliance is non-negotiable. An obvious business case for XACML. Intellectual Property Control Profile simplifies access controls for the protection of copyright, trademarks, patents and trade secrets. Compliance with export control regulations can only be […]

Insurance Industry Brief

Insurance companies go to market via agents and agents of agents. Clients expect efficient and secure online services. Authorities demand strict regulatory compliance. Attribute Based Access Control (ABAC) keeps everyone happy. In 1768, Captain Cook took out a policy on his modest home near Assembly Row off London’s Mile End Road. The house was covered […]

CSS Insurance – Onboarding New Authorization Tasks

Having tested various solutions to resolve authorization issues with their corporate document management system, CSS Insurance turned to the Axiomatics Policy Server (APS) to deliver effective Attribute Based Access Control. As the fine-grained, context-aware authorization tool had already been deployed to ensure compliance with newly introduced healthcare reporting regulations, the challenge was to increase the scope […]

Swiss Re – User Permisson Management

The insurance sector is highly regulated. Sensitive information must be protected in compliance with regulations, with as little impact on business as possible. At the same time compliance with regulations has to be proven to auditors. Key to this is managing and enforcing user permissions to information. However, in many organizations legacy IT systems and […]

Cross Border Privacy Enforcement – Global Financial Services and the Data Flow Challenge

Privacy regulations impact cross-border transactions in the financial services industry. Domestic processing of personally identifiable information (PII) and the transfer thereof for storage or processing outside the country’s jurisdiction are scenarios with different regulatory mandates. This business case brief will highlight the challenges and solution to secure information and to be compliant with regulations. Key […]

Cutting Through Export Control with Bell Helicopter and Axiomatics

In this webinar, together with guest speaker Greg Heartsfield from Bell Helicopter, we will focus on the complexity of export control and PLM systems and the challenge of overseeing data classification schemes subject to change. Because PLM systems were designed to help collaboration across departments and external parties, these systems require fine-grained authorization to make […]

Access Control Obstacles – How to Win the Challenge of IT vs. Business Units

Attribute Based Access Control (ABAC) may be the future of identity and access management (just ask analysts Gartner and KuppingerCole) but up until now there have been certain obstacles. In the main these are non-technical – and they are now being overcome. With the launch of the Axiomatics Policy Server 6.0, Axiomatics is bridging the […]