Webinars
Speed, Privacy and Security – Getting to the Value of Data in Apache Spark
Data Security
In The News
Digital Journal Q&A: How to control access to IoT data
Internet of Things (IOT)
Webinars
Controlling Access to Business-Critical Data
Data Security
Webinars
Authorization that Scales to the Cloud and Beyond
Cloud
VMblog shares Axiomatics 2019 Predictions: Data Security
2019 Modern Data Center Technology Prediction Series Industry executives and experts share their predictions for 2019. Gerry Gebel, our VP of Business Development, contributed this article as part of the 11th annual VMblog.com series exclusive. Data Security As new security threats emerge and threaten sensitive customer information, businesses must develop new procedures and adopt modern […]
IT Pro Portal:Critical Data Security Trends for 2019 and beyond
An article by Gerry Gebel in www.itproportal.com; IT Pro Portal covers the Critical Data Security Trends for 2019 and beyond. It originally appeared here. Critical data security trends for 2019 and beyond Let’s take an in-depth look into the trends we expect to shape the data security landscape next year. Enterprise security is rapidly evolving […]
CloudPost: Seven Big Data Security Trends of 2019
2018 was a monumental year for cloud technologies and data security. As businesses moved application workflows to the cloud, they were forced to manage new data security challenges to balance a new modern hybrid data storage model that combines both cloud and on-premise infrastructures. An article in CloudPost By Gerry Gebel, Vice President of Business Development […]
JAXenter: Predictions for the new year – Crucial data security trends and challenges for 2019
2019 has only just begun – what will the year hold? Ring in the new year with tech predictions from the experts. Today, Pablo Giambiagi, Vice President of Strategic Research at Axiomatics dives into the trends and challenges for data security in 2019. Read the article in its entirety here. Predictions for the new year: […]
Use Cases
Get to the Cloud Faster, and More Securely
As enterprises continue to migrate applications, services and workloads to the cloud, they are addressing the challenge of how to protect resources in an open, cloud environment while also securely sharing the right information. It’s an opportunity to rethink how your enterprise manages Identity and Access Management (IAM) and how to ensure that your cloud […]
Analyst Reports
KuppingerCole Report – Executive View: Axiomatics Data Centric Security
KuppingerCole’s Executive View reports offer advice to IT professionals looking for data-centric security. In the October 2017 report, Axiomatics’ data-centric dynamic authorization suite is profiled. The report sheds light on two flagship products: Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control […]
Infographics
The State of Data Centric Security
Data-centric security signifies a new generation of database security techniques, based on a combination of robust and proven technologies: contextual data filtering, dynamic data masking and standards-based Attribute Based Access Control (ABAC). Check out our infographic on the case for data-centric security.
White Papers
Data-centric Security for Pharmaceuticals – Executive Summary
Providing the right stakeholders with unobstructed access to sensitive data is essential in any industry. Within the pharmaceutical and biotech industries, inefficient data sharing and collaboration slow down the research process and delay the launch of new products. However implementing an effective data share approach can be extremely complex through a combination of business, security, privacy and regulatory […]
Webinars
Authorization for Big Data: Introducing SmartGuard
Safeguard Information Assets with SmartGuardTM for Big Data We are seeing a strong, impressive adoption pace of Big Data systems within enterprises. Primarily driven by the various business and technical insights derived from the use of these systems, they depend on the quantity and quality of data and information captured in them. As more sensitive […]