Making a Business Case for Attribute Based Access Control (ABAC)

Cut Costs, Streamline Access Control and Achieve Compliance. Are you looking to shift your access control approach to handle today’s complex IT environment? Or maybe you’re find you’re already spending too much time and money managing access control and it’s not meeting your security expectations? In fact, we see many security architecture teams across the Fortune […]

New Years Detox – Eliminating Toxic Combinations in your Access Control

As access control has become more complex, the assignment of roles has exploded out of control, making it harder to eliminate toxic combinations of roles that end up allowing access that should actually be denied. For example, the same person entering a trade should not be allowed to confirm it as well, as this can lead […]

Centralizing the Code – Separating Authorization Logic from Apps

For any business in the Fortune 1000 – such as health care, insurance, banking, pharmaceuticals and manufacturing – the need to shift beyond legacy role-based access control models becomes more immediate with every data breach. There’s one trend that’s crossing industries – separating hard-coded authorization logic from applications: externalizing authorization and using a policy-based approach […]

The Identity & Access Management (R)evolution

Ready to evolve your access control to meet new complexities? Many organizations are currently striving to develop new strategies in their IAM vision and roadmap planning. While investments that are already in place need to be leveraged, organizations look for IAM capabilities that will make them more agile and responsive to change requests. This paper […]

Shifting to Attribute Based Access Control

No longer is a company’s data restricted by the boundaries imposed by physical office space and a local area network. Data sharing and collaboration transcend organizational borders and older models of access control cannot keep pace. They simply fail, and often with disastrous results. The static assignment of user permissions either directly or by way […]

Getting Started With Attribute Based Access Control

Implementation of an Attribute Based Access Control (ABAC) system is accomplished by the completion of three main task groups: Policy Modeling Attribute Sourcing Application Integration By orchestrating these three activities, organizations can effectively deploy an ABAC system and begin taking advantage of a more secure, flexible and business-driven approach to data sharing, to securing critical resources, and to […]

Swiss Re – User Permisson Management

The insurance sector is highly regulated. Sensitive information must be protected in compliance with regulations, with as little impact on business as possible. At the same time compliance with regulations has to be proven to auditors. Key to this is managing and enforcing user permissions to information. However, in many organizations legacy IT systems and […]

Axiomatics Bootcamp ABAC 101

This “bootcamp” style webinar provides a basic overview of Attribute Based Access Control (ABAC) and how it helps solve complex data access control challenges. Enterprises and government agencies are making the shift to ABAC to help tackle specific use cases – including compliance with privacy laws, enabling inter-government agency collaboration, reduction of data leakage, combating […]

Overcoming Role Explosion Challenges with Attribute-Based Access Control

Access control has been predominantly managed with a legacy static model based on user roles – called “Role-based Access Control”, or RBAC. Enterprises that use RBAC are now experiencing role explosion – and difficulty scaling RBAC to meet the complex access control requirements of today’s workforce and the need to share, securely. Key Takeaways: Understanding an […]