SC Media Feature: Writing Authorization Policies to Secure Big Data

“Enforcing authorization directly at the data level can be incredibly powerful as it could mean minimal or no changes to the applications that are accessing the data itself,” says Jonas Iggbom. In the digital age, enterprises are accumulating and storing massive amounts of data. The more data an enterprise has stored, the more critical it […]

Axiomatics Boot Camp: Testing XACML Policies Using JUnit, Eclipse, and the Abbreviated Language for Authorization (ALFA)

Experts Henrik Johansson of Knowit and David Brossard of Axiomatics provide a deep dive into testing XACML policies in this technical webinar. We start with the authorization lifecycle and how it works, and highlight the importance of testing access policies before implementing them in production. Next we provide an overview on using the Axiomatics PEP […]

Boot Camp: Creating a Policy Enforcement Point

Axiomatics has a new Java PEP SDK available with performance improvements. This boot camp session shares the details of the new SDK and what’s changed in the latest version. In addition, this boot camp covers:  How to change your current code to leverage the new SDK Using other PEP alternatives (REST/JSON)    

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

A Webinar with Axiomatics and IAM Analysts KuppingerCole: Take me to recording Join Axiomatics and leading analyst firm KuppingerCole to learn more about Attribute Based Access Control (ABAC). ABAC solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments […]

Delivering Fine-Grained Authorization Today by Leveraging a Federated Identity Service and ABAC

A webinar with Axiomatics and Radiant Logic View the recording here: http://www.radiantlogic.com/learning-center/events/webinars/webinar-3312016/ A recent Gartner report predicts that by 2020, 70% of organizations will use Attribute-Based Access Control (ABAC) to protect critical assets, up from 5% today. We all know that ABAC—for fine-grained authorization, externalized and standards-based representation of policies—is the way to go. Along the way, […]

Axiomatics Boot Camp: ABAC and XACML Made Easy – Using ALFA to Write Fine-Grained Authorization Policies

Does the promise of attribute-based access control sound like magic? Don’t worry, you don’t need to be a wizard to write efficient and secure ABAC policies. In this bootcamp webinar, we will show you how you can easily write ABAC policies straight from within your IDE by using ALFA, the Abbreviated Language for Authorization. We […]

New Years Detox – Eliminating Toxic Combinations in your Access Control

As access control has become more complex, the assignment of roles has exploded out of control, making it harder to eliminate toxic combinations of roles that end up allowing access that should actually be denied. For example, the same person entering a trade should not be allowed to confirm it as well, as this can lead […]

Axiomatics Boot Camp – Managing Multiple Projects for Policy Authoring and Deployment

When using an Attribute Based Access Control approach, enterprises have varying requirements for segregation of an access control policy authoring and deployment architecture. These typically reflect their internal governance and compliance rules. For example, an enterprise may mandate that an employee associated with a specific department should not be able to view, much less edit, […]

Axiomatics Extension for CA Single Sign-On

This product sheet explains how the Axiomatics Extension for CA Single Sign-On delivers dynamic authorization for web access management by enforcing user permissions based on corporate policies and regulations.

Axiomatics Policy Auditor

The Axiomatics Policy Auditor (APA) with Prover Plug-In1 delivers a platform for auditors and IT administrators to analyze and audit eXtensible Access Control Markup Language (XACML) policies within an organization. Designed with business users in mind, the APA simplifies the task of auditing security policies by allowing its users to: Verify compliance of XACML policies. […]

Axiomatics Bootcamp 201 – Using JSON and REST Profiles for External Authorization

JSON and REST are widely used to implement lightweight and fast web services. This Axiomatics Boot Camp session will provide technical insight into using these XACML profiles for externalized authorization. This is a prime session if you’re a developer or architect and are looking to adopt Attribute Based Access Control. Key takeaways: What is Attribute […]

Flexible and Dynamic Security for the Data-Centric Enterprise

Requirements for securing data often pass down from C-level executives through multiple layers: from security architects out to the teams and systems administrators responsible for implementing security requirements. At each step, different tools are used to achieve the objectives, making it difficult to trace the security configuration back to the original requirements. This results in […]

Access Control Obstacles – How to Win the Challenge of IT vs. Business Units

Attribute Based Access Control (ABAC) may be the future of identity and access management (just ask analysts Gartner and KuppingerCole) but up until now there have been certain obstacles. In the main these are non-technical – and they are now being overcome. With the launch of the Axiomatics Policy Server 6.0, Axiomatics is bridging the […]