Using Elastic Dynamic Authorization for APIs, Microservices and Data

APIs have become the backbone of many services – from the weather forecast to delivery notifications and photo printing services. Not only can we consume data and services more readily through those APIs but we can also mash them up into greater services. To do so, we tackled API security through OAuth and OpenID Connect. […]

Digital Journal Q&A: How to control access to IoT data

Q&A: How to control access to IoT data By Tim Sandle This article appeared in Digital Journal. IoT is responsible for driving the biggest quantity of data into data lakes for businesses to analyze and leverage for analytics. With so much data at stake, companies must control who can and cannot access that data. This is […]

Authorization that Scales to the Cloud and Beyond

Companies are leveraging cloud native capabilities such as storage, orchestration, and compute to deliver value to their business; and much of net new application development now takes place in the cloud at a faster pace than ever before. We see the proliferation of more services, more users, and more data which all translate to more […]

IT Pro Portal:Critical Data Security Trends for 2019 and beyond

An article by Gerry Gebel in www.itproportal.com; IT Pro Portal covers the Critical Data Security Trends for 2019 and beyond.  It originally appeared here. Critical data security trends for 2019 and beyond Let’s take an in-depth look into the trends we expect to shape the data security landscape next year. Enterprise security is rapidly evolving […]

Cloud Computing Ranks: The number one 2019 career skill

Article originally posted in VM Virtual Machine. Cloud computing ranks: The number one 2019 career skill 2019 is the Year of the Pig, but will it also be the Year of the Cloud? Social media giant LinkedIn released a blog about “The Skills Companies Need Most in 2019 – And How to Learn Them”. What’s […]

CloudPost: Seven Big Data Security Trends of 2019

2018 was a monumental year for cloud technologies and data security. As businesses moved application workflows to the cloud, they were forced to manage new data security challenges to balance a new modern hybrid data storage model that combines both cloud and on-premise infrastructures. An article in CloudPost By Gerry Gebel, Vice President of Business Development  […]

Get to the Cloud Faster, and More Securely

As enterprises continue to migrate applications, services and workloads to the cloud, they are addressing the challenge of how to protect resources in an open, cloud environment while also securely sharing the right information. It’s an opportunity to rethink how your enterprise manages Identity and Access Management (IAM) and how to ensure that your cloud […]

CSO Online Feature: How important defense in depth will be as the lines between security layers blur

By Gerry Gebel (This article originally appeared in CSO Online.) What key roles defense in depth and layered security will play in the digital age. Defense in depth and layered security feel like terms from a much simpler era in information security. It was not too long ago when these concepts seemed more applicable during […]

KuppingerCole Report – Executive View: Axiomatics Policy Server

The Axiomatics Policy Server (APS) has been named among the leading access control solutions for its outstanding features according to KuppingerCole in this Executive View report. Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization’s breadth of access control needs. APS makes available a suite of tools and services to manage […]

DZone Feature: How to Create and Maintain Database Security Using Dynamic Authorization

With organizations now relying so much on data, they should look towards a fine-grained policy-based approach to control access to critical information. By Gerry Gebel We are living in a data-driven world where organizations rely on data for virtually everything. Businesses across every vertical have become reliant on data for day-to-day business operations by collecting […]

ReadITQuik Interviews Niklas Jakobsson, Axiomatics CEO

This week, read Niklas Jakobsson, CEO at Axiomatics talk about security services organizations should use to access data and resources and how the first line of protection should always be based on Attribute Based Access Control (ABAC) – a platform that can turn collaboration into a competitive advantage by enabling individuals within an organization to […]

SmartGuard® for Data Demo

The security risk of data stores is emerging as a threat, and data breaches will be bigger than ever – with even more data at stake. Privacy issues are compounded, and legacy access control issues just get bigger: -Role explosion with one dimensional role-based systems -Inability to capture complex policy requirements, such as segregation of […]

CSO Online Feature: How Enterprise Security Transformed in 2017 and What Comes Next in 2018

Digital transformation and microservices made up the most impactful trends for the enterprise security industry in 2017, but what will have the biggest impact in 2018? Enterprise security is always evolving, not by choice but because organizations are constantly facing new security threats. As 2018 fast approaches, let’s take a quick look back at how […]

Axiomatics Data Access Filter for Multiple Databases – Product Sheet

Get to the heart of access control, with policy-based authorization applied on the content of relational databases. The Axiomatics Data Access Filter for Multiple Databases derives user permissions from real-time evaluation of policies, and can filter, mask or redact based on these same policies. This data-centric security approach provides the visibility and control required in today’s […]

European Bank Achieves Proactive Data Security, Compliance with ABAC

Executive Summary The primary driver for this project was to achieve compliance with a Personal Data Protection Law and to prepare for future regulatory challenges. In addition, the bank’s authorization was historically domain-specific, meaning policies were defined, governed, and implemented by the application owners only. This approach delivered adequate functionality within silos but no control […]

SC Media Feature: Writing Authorization Policies to Secure Big Data

“Enforcing authorization directly at the data level can be incredibly powerful as it could mean minimal or no changes to the applications that are accessing the data itself,” says Jonas Iggbom. In the digital age, enterprises are accumulating and storing massive amounts of data. The more data an enterprise has stored, the more critical it […]

KuppingerCole Report – Executive View: Axiomatics Data Centric Security

KuppingerCole’s Executive View reports offer advice to IT professionals looking for data-centric security. In the October 2017 report, Axiomatics’ data-centric dynamic authorization suite is profiled. The report sheds light on two flagship products: Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control […]

EY Digital Identity and Access Management Report

As organizations shift business strategies towards new digital channels to maintain a competitive advantage, and consumers become increasingly reliant on multiple device connections, cybersecurity threats are becoming more prolific and more sophisticated than ever before. Cybersecurity is no longer about prevention, but rather about detection and readiness for the inevitable. And everyone, from boardroom to […]

KuppingerCole Executive View: Axiomatics Policy Management Suite

The Axiomatics Policy Management suite provides a solution for companies wanting to provide fine grained access control to protected resources. This means evaluating a user’s access request, at runtime, against pre-determined policies to either permit or deny the user’s request. Applications then apply the decision. The Axiomatics Policy Suite was featured in this Leadership Compass […]

Why Axiomatics?

As the global independent leader in Dynamic Authorization solutions, our people, expertise, and our best-in-class software set us apart. Customers come to us to solve complex use cases around access control to applications, databases, Big Data, microservices, and APIs. Through a policy-based approach to dynamic authorization that utilizes the Attribute Based Access Control (ABAC) model, […]

The State of Data Centric Security

Data-centric security signifies a new generation of database security techniques, based on a combination of robust and proven technologies: contextual data filtering, dynamic data masking and standards-based Attribute Based Access Control (ABAC). Check out our infographic on the case for data-centric security.

How ABAC fits into an IAM Framework

IAM teams are finding that Attribute Based Access Control is key to meeting regulatory and compliance requirements. ABAC is an access control approach that is recommended by NIST and discussed in their Guide to Attribute Based Access Control (ABAC) Definition and Considerations (NIST Special Publication 800-162) document. With ABAC, the use of subject, environment, and […]

The Basics of Attribute Based Access Control (ABAC)

Traditionally, the focus of authorization and access control has been on building barriers to sensitive data and only making it available to a select few. But that’s changed as companies want to get more from their data and make it really work for them. Authorization is now about facilitating user access to the right data […]

Data-centric Security for Pharmaceuticals – Executive Summary

Providing the right stakeholders with unobstructed access to sensitive data is essential in any industry. Within the pharmaceutical and biotech industries, inefficient data sharing and collaboration slow down the research process and delay the launch of new products. However implementing an effective data share approach can be extremely complex through a combination of business, security, privacy and regulatory […]

Axiomatics Dynamic Authorization

Unified Dynamic Authorization: Enterprise Access Control, Anywhere, anytime.  Axiomatics provides externalized authorization through attribute and policy-based access control for applications, databases, Big Data, APIs and microservices. As the premier vendor in authorization, Axiomatics solutions are ideal for enterprises and government agencies that need to securely share information, while complying with complex and ever-evolving regulations. The Axiomatics […]

(Big) Data Security: Protecting Information at the Source

With the growing adoption of cloud computing, Big Data or open APIs, managing, securing and sharing massive amounts of digital data across heterogeneous and increasingly interconnected infrastructures is becoming increasingly difficult. From file servers to relational databases and big data frameworks, to the Internet of Things and entire API ecosystems – each data model imposes […]

KuppingerCole Executive View: Axiomatics Data Access Filter

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes. This Executive View from analyst firm […]

KuppingerCole Leadership Compass 2014

The Axiomatics Policy Server was featured in this Leadership Compass from KuppingerCole, by analyst Graham Williamson: Dynamic Authorization Management: Leaders in innovation, product features, and market reach for Dynamic Authorization Management. Your compass for finding the right path in the market. Axiomatics provides a sophisticated policy management environment. It divides policies into domains and allows a […]

SmartGuard® for Data – Data Sheet

SmartGuard for Data from Axiomatics protects big data stores against unauthorized access and exfiltration of data; only allowing authorized users or applications to access the data they’re authorized to see, at the right time, under the right conditions. This data sheet outlines the technical specs and requirements for this product, including the Spark SQL Edition. […]

SmartGuard® for Data – Product Sheet

SmartGuard for Data from Axiomatics protects big data stores against unauthorized access and exfiltration of data; only allowing authorized users or applications to access the data they’re authorized to see, at the right time, under the right conditions. SmartGuard for Data supports Apache Spark and SQL-on-Hadoop (Hive, Hawq and Impala). This ensures the most critical […]

The Future of Data-Centric Security

  Click here to view recording Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization. The data access filtering approach signifies a new generation of database security techniques, based on a combination of two robust and proven technologies: data-centric security and standards-based Attribute […]

Authorization for Big Data: Introducing SmartGuard

Safeguard Information Assets with SmartGuardTM for Big Data We are seeing a strong, impressive adoption pace of Big Data systems within enterprises. Primarily driven by the various business and technical insights derived from the use of these systems, they depend on the quantity and quality of data and information captured in them. As more sensitive […]

Attribute Based Access Control for Manufacturing

Attribute Based Access Control for Manufacturing Manufacturers around the globe are faced with the growing risk of breaches – in many cases the attackers are after IP and sensitive customer data. Using an Attribute Based Access Control approach can help balance the need to protect these critical assets, while facilitating collaboration through the sharing of […]

Vital Authorization Add-ons – Reporting, auditing and access review for Axiomatics Policy Server and Data Access Filter

This product sheet highlights the reporting, auditing and access review add-ons we provide.

How Top Banks Use an Attribute-Based Approach (ABAC) to Protect PII, Critical Assets, and Meet Regulations

Find out why Attribute Based Access Control is the solution for the world’s leading banks and financial institutions. As demands for better online services– from customers, staff and third parties – escalate, so too do the number and complexity of regulations. The list of requirements is many: FFIEC, FRB, FDIC, OCC, NCUA, CFPB, ACSSS to […]

Healing Data Leakage in the Modern Health Care Environment

The move to electronic records (EHR) in the health care industry – across providers, insurance companies and a multitude of third parties – has increased the speed of sharing records, and in theory, the quality of care provided to individuals. However, this instant-access ecosystem also introduces increased risk – as the more users that have […]

Joint webinar with Axway – Protecting Your Data Beyond the Enterprise with Fine Grained Access Control for APIs and Data

Please join Axiomatics and Mark O’Neill, VP of Innovation at Axway, as we discuss the role that fine grained access control plays in securing APIs and the data that flows through them. We will share best practices for deploying an API Gateway coupled with a powerful and flexible Policy Server to deliver scalable security with […]

Axiomatics Boot Camp – Database Filtering and Policy Creation

Data Access Filtering is the ability to apply access policies to database requests to ensure that only authorized individuals are allowed to read and write data, and to further protect this data by dynamically masking or redacting it so that sensitive data is never exposed. In this Axiomatics Boot Camp session, we will cover drivers […]

Axiomatics Data Access Filter – Next Generation Data-Centric Security

This whitepaper introduces the Axiomatics Data Access Filter product family. The data access filtering approach represents a new generation of database security techniques, based on a combination of two robust and proven technologies: data-centric security and standards-based Attribute Based Access Control (ABAC). In this context, Axiomatics defines Data Access Filtering as the ability to apply access policies […]

KuppingerCole Executive View Axiomatics Data Access Filter

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes. This Executive View from analyst firm […]

Safe Harbor: The New Privacy Challenges

Now that Safe Harbor agreement has been deemed invalid global organizations with employees and customers in Europe face new data privacy challenges. To meet compliance and cope with ongoing regulation changes, authorization needs to be dynamic. Protecting PII and upholding business agility requires fine-grained access control of citizens’ data.

Axiomatics Boot Camp – Managing Multiple Projects for Policy Authoring and Deployment

When using an Attribute Based Access Control approach, enterprises have varying requirements for segregation of an access control policy authoring and deployment architecture. These typically reflect their internal governance and compliance rules. For example, an enterprise may mandate that an employee associated with a specific department should not be able to view, much less edit, […]

Axiomatics Extension for CA Single Sign-On

This product sheet explains how the Axiomatics Extension for CA Single Sign-On delivers dynamic authorization for web access management by enforcing user permissions based on corporate policies and regulations.

Axiomatics Data Access Filter for Multiple Databases – Data Sheet

The Axiomatics Data Access Filter applies access policies to database requests, thereby ensuring that only authorized individuals are allowed to read and write data, and to further protect this data by dynamically masking or redacting it so that sensitive data is never exposed. Get the technical details on how the product works and the system […]

Axiomatics Boot Camp 101 – Filter Sensitive Data at the Database Layer and Keep it Secure

With so much rich, valuable data stored in databases, they are constantly targeted and too often breached. By dynamically filtering and masking data at the row, column and cell level, enterprises can ensure the user only sees that data which they are authorized to access. In this webinar IT security experts David Brossard and Srijith […]

Meeting Health Care Privacy Regulations with Attribute Based Access Control

Personally Identifiable Information (PII) with related sensitive health care data is increasingly being maintained in electronic records. This means PII data can be made available, reproduced and transferred with more ease than ever before. Legislation in many countries is being adapted to secure trust in institutions, to meet the confidentiality and privacy concerns that are […]

Increasing the Value of Information with Fine Grained Security for Data Marts

Knowledge intensive industries, such as Pharma, Banking, Insurance, Media and Energy, increasingly rely upon timely access to integrated information for innovation and product development, as well as the marketing of new products and services. Critical decision making processes within these industries are based at least in part upon the value proposition that providing more stakeholders […]

Patient Data Privacy for eHealth Services

The Center for eHealth in Sweden coordinates the efforts of county councils and regions in the establishment of national eHealth services. Within this framework, the Swedish national healthcare security infrastructure “BIF” is maintained. The overall objective is to provide a secure infrastructure to meet patient privacy requirements while granting authorized care providers access to the […]

Financial Services Industry Brief

Is it possible to protect access to sensitive information and secure financial transactions without sacrificing business agility? It is with dynamic authorization and policy-driven access control. Leading financial institutions around the world are shifting to Attribute Based Access Control (ABAC) to get this balance right. ABAC helps them meet the authorization demands of the modern […]

Beyond Database Security

This is a joint webinar together with analyst firm KuppingerCole. Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues. The more information is available to and shared with those who […]

Flexible and Dynamic Security for the Data-Centric Enterprise

Requirements for securing data often pass down from C-level executives through multiple layers: from security architects out to the teams and systems administrators responsible for implementing security requirements. At each step, different tools are used to achieve the objectives, making it difficult to trace the security configuration back to the original requirements. This results in […]