IT Pro Portal:Critical Data Security Trends for 2019 and beyond

An article by Gerry Gebel in www.itproportal.com; IT Pro Portal covers the Critical Data Security Trends for 2019 and beyond.  It originally appeared here. Critical data security trends for 2019 and beyond Let’s take an in-depth look into the trends we expect to shape the data security landscape next year. Enterprise security is rapidly evolving […]

CSO Online Feature: How important defense in depth will be as the lines between security layers blur

By Gerry Gebel (This article originally appeared in CSO Online.) What key roles defense in depth and layered security will play in the digital age. Defense in depth and layered security feel like terms from a much simpler era in information security. It was not too long ago when these concepts seemed more applicable during […]

Axiomatics Data Access Filter for Multiple Databases – Product Sheet

Get to the heart of access control, with policy-based authorization applied on the content of relational databases. The Axiomatics Data Access Filter for Multiple Databases derives user permissions from real-time evaluation of policies, and can filter, mask or redact based on these same policies. This data-centric security approach provides the visibility and control required in today’s […]

European Bank Achieves Proactive Data Security, Compliance with ABAC

Executive Summary The primary driver for this project was to achieve compliance with a Personal Data Protection Law and to prepare for future regulatory challenges. In addition, the bank’s authorization was historically domain-specific, meaning policies were defined, governed, and implemented by the application owners only. This approach delivered adequate functionality within silos but no control […]

KuppingerCole Report – Executive View: Axiomatics Data Centric Security

KuppingerCole’s Executive View reports offer advice to IT professionals looking for data-centric security. In the October 2017 report, Axiomatics’ data-centric dynamic authorization suite is profiled. The report sheds light on two flagship products: Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control […]

Data-centric Security for Pharmaceuticals – Executive Summary

Providing the right stakeholders with unobstructed access to sensitive data is essential in any industry. Within the pharmaceutical and biotech industries, inefficient data sharing and collaboration slow down the research process and delay the launch of new products. However implementing an effective data share approach can be extremely complex through a combination of business, security, privacy and regulatory […]

KuppingerCole Executive View: Axiomatics Data Access Filter

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes. This Executive View from analyst firm […]

Axiomatics Boot Camp – Database Filtering and Policy Creation

Data Access Filtering is the ability to apply access policies to database requests to ensure that only authorized individuals are allowed to read and write data, and to further protect this data by dynamically masking or redacting it so that sensitive data is never exposed. In this Axiomatics Boot Camp session, we will cover drivers […]

Axiomatics Data Access Filter – Next Generation Data-Centric Security

This whitepaper introduces the Axiomatics Data Access Filter product family. The data access filtering approach represents a new generation of database security techniques, based on a combination of two robust and proven technologies: data-centric security and standards-based Attribute Based Access Control (ABAC). In this context, Axiomatics defines Data Access Filtering as the ability to apply access policies […]

KuppingerCole Executive View Axiomatics Data Access Filter

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes. This Executive View from analyst firm […]

Safe Harbor: The New Privacy Challenges

Now that Safe Harbor agreement has been deemed invalid global organizations with employees and customers in Europe face new data privacy challenges. To meet compliance and cope with ongoing regulation changes, authorization needs to be dynamic. Protecting PII and upholding business agility requires fine-grained access control of citizens’ data.

Axiomatics Data Access Filter for Multiple Databases – Data Sheet

The Axiomatics Data Access Filter applies access policies to database requests, thereby ensuring that only authorized individuals are allowed to read and write data, and to further protect this data by dynamically masking or redacting it so that sensitive data is never exposed. Get the technical details on how the product works and the system […]

Axiomatics Boot Camp 101 – Filter Sensitive Data at the Database Layer and Keep it Secure

With so much rich, valuable data stored in databases, they are constantly targeted and too often breached. By dynamically filtering and masking data at the row, column and cell level, enterprises can ensure the user only sees that data which they are authorized to access. In this webinar IT security experts David Brossard and Srijith […]

Increasing the Value of Information with Fine Grained Security for Data Marts

Knowledge intensive industries, such as Pharma, Banking, Insurance, Media and Energy, increasingly rely upon timely access to integrated information for innovation and product development, as well as the marketing of new products and services. Critical decision making processes within these industries are based at least in part upon the value proposition that providing more stakeholders […]

Beyond Database Security

This is a joint webinar together with analyst firm KuppingerCole. Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues. The more information is available to and shared with those who […]

Flexible and Dynamic Security for the Data-Centric Enterprise

Requirements for securing data often pass down from C-level executives through multiple layers: from security architects out to the teams and systems administrators responsible for implementing security requirements. At each step, different tools are used to achieve the objectives, making it difficult to trace the security configuration back to the original requirements. This results in […]