Axiomatics Data Access Filter for Multiple Databases – Product Sheet

Get to the heart of access control, with policy-based authorization applied on the content of relational databases. The Axiomatics Data Access Filter for Multiple Databases derives user permissions from real-time evaluation of policies, and can filter, mask or redact based on these same policies. This data-centric security approach provides the visibility and control required in today’s […]

European Bank Achieves Proactive Data Security, Compliance with ABAC

Executive Summary The primary driver for this project was to achieve compliance with a Personal Data Protection Law and to prepare for future regulatory challenges. In addition, the bank’s authorization was historically domain-specific, meaning policies were defined, governed, and implemented by the application owners only. This approach delivered adequate functionality within silos but no control […]

KuppingerCole Report – Executive View: Axiomatics Data Centric Security

KuppingerCole’s Executive View reports offer advice to IT professionals looking for data-centric security. In the October 2017 report, Axiomatics’ data-centric dynamic authorization suite is profiled. The report sheds light on two flagship products: Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control […]

The State of Data Centric Security

Data-centric security signifies a new generation of database security techniques, based on a combination of robust and proven technologies: contextual data filtering, dynamic data masking and standards-based Attribute Based Access Control (ABAC). Check out our infographic on the case for data-centric security.

Data-centric Security for Pharmaceuticals – Executive Summary

Providing the right stakeholders with unobstructed access to sensitive data is essential in any industry. Within the pharmaceutical and biotech industries, inefficient data sharing and collaboration slow down the research process and delay the launch of new products. However implementing an effective data share approach can be extremely complex through a combination of business, security, privacy and regulatory […]

(Big) Data Security: Protecting Information at the Source

With the growing adoption of cloud computing, Big Data or open APIs, managing, securing and sharing massive amounts of digital data across heterogeneous and increasingly interconnected infrastructures is becoming increasingly difficult. From file servers to relational databases and big data frameworks, to the Internet of Things and entire API ecosystems – each data model imposes […]

KuppingerCole Executive View: Axiomatics Data Access Filter

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes. This Executive View from analyst firm […]

The Future of Data-Centric Security

  Click here to view recording Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization. The data access filtering approach signifies a new generation of database security techniques, based on a combination of two robust and proven technologies: data-centric security and standards-based Attribute […]

Authorization for Big Data: Introducing SmartGuard

Safeguard Information Assets with SmartGuardTM for Big Data We are seeing a strong, impressive adoption pace of Big Data systems within enterprises. Primarily driven by the various business and technical insights derived from the use of these systems, they depend on the quantity and quality of data and information captured in them. As more sensitive […]

Vital Authorization Add-ons – Reporting, auditing and access review for Axiomatics Policy Server and Data Access Filter

This product sheet highlights the reporting, auditing and access review add-ons we provide.

Axiomatics Boot Camp – Database Filtering and Policy Creation

Data Access Filtering is the ability to apply access policies to database requests to ensure that only authorized individuals are allowed to read and write data, and to further protect this data by dynamically masking or redacting it so that sensitive data is never exposed. In this Axiomatics Boot Camp session, we will cover drivers […]

Axiomatics Data Access Filter – Next Generation Data-Centric Security

This whitepaper introduces the Axiomatics Data Access Filter product family. The data access filtering approach represents a new generation of database security techniques, based on a combination of two robust and proven technologies: data-centric security and standards-based Attribute Based Access Control (ABAC). In this context, Axiomatics defines Data Access Filtering as the ability to apply access policies […]

KuppingerCole Executive View Axiomatics Data Access Filter

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes. This Executive View from analyst firm […]

Axiomatics Data Access Filter for Multiple Databases – Data Sheet

The Axiomatics Data Access Filter applies access policies to database requests, thereby ensuring that only authorized individuals are allowed to read and write data, and to further protect this data by dynamically masking or redacting it so that sensitive data is never exposed. Get the technical details on how the product works and the system […]

Axiomatics Boot Camp 101 – Filter Sensitive Data at the Database Layer and Keep it Secure

With so much rich, valuable data stored in databases, they are constantly targeted and too often breached. By dynamically filtering and masking data at the row, column and cell level, enterprises can ensure the user only sees that data which they are authorized to access. In this webinar IT security experts David Brossard and Srijith […]

Beyond Database Security

This is a joint webinar together with analyst firm KuppingerCole. Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues. The more information is available to and shared with those who […]