Securing Critical Enterprise Applications and APIs with Dynamic, Risk-based Authorization and Governance

Until now, Identity Governance and Administration (IGA) and ABAC tools have largely been deployed and operated independently of each other. However, there is significant value in describing and implementing a set of use cases where integrations between IGA and ABAC systems can be accomplished to further ensure best-in-class IAM. Growing customer requirements are the key […]

Streamline Access Control with Federated Identity and ABAC

Enterprises are pained by legacy access control approaches. They are looking to achieve better access control management and consistency along with strong audit control and ease of record keeping and archiving. But the challenges are many: Lines of business have defined their own roles for access. Silos in the organization have different models and patterns […]

Axiomatics Identifies Transformative Enterprise Security Trends for 2018

DevSecOps, Securely Sharing Data and Regulatory Compliance Highlight the Trends to Watch for Enterprise Security in 2018 CHICAGO (December 13, 2017) – Axiomatics, the leader in fine-grained dynamic authorization, today announced the top enterprise security trends that will have significant ramifications for businesses in 2018 and beyond. The trends were compiled by a panel of security […]

Fortune 500 Transportation Company Simplifies Access Control for 175,000 Users

One of the largest freight transportation companies in the world, with over 50,000 employees, stores and manages data with access in mind for over 175,000 user accounts. Over the past 50 years, the company has solved difficult technical problems for this population with innovative, forward-thinking solutions. With time however, the company had outgrown its systems, […]

KuppingerCole Executive View: Axiomatics Policy Management Suite

The Axiomatics Policy Management suite provides a solution for companies wanting to provide fine grained access control to protected resources. This means evaluating a user’s access request, at runtime, against pre-determined policies to either permit or deny the user’s request. Applications then apply the decision. The Axiomatics Policy Suite was featured in this Leadership Compass […]

Why Axiomatics?

As the global independent leader in Dynamic Authorization solutions, our people, expertise, and our best-in-class software set us apart. Customers come to us to solve complex use cases around access control to applications, databases, Big Data, microservices, and APIs. Through a policy-based approach to dynamic authorization that utilizes the Attribute Based Access Control (ABAC) model, […]

Federal Mission: Security Compliance using Externalized Authorization Management (EAM)

United States federal agencies are beholden to myriad regulations and standards, some of the most notable of which are the FIPS Publication 200 and the NIST Special Publication 800-53. Both documents, in combination, “ensure that appropriate security requirements and security controls are applied to all federal information and information systems.” These documents offer guidance on […]

Five Ways to Prepare for an ABAC Program

As adoption of a policy-based approach to access control using ABAC becomes more widespread, organizations are faced with the challenges of how to prepare for a deployment: to ensure speed-to-market, enterprise-wide adoption and ROI achievement. Check out this guide to the five areas to consider in preparing for ABAC in your organization.

The CISO’s Guide to Planning for ABAC Success – with Guest Speakers from Security Architects Partners

A webinar with Axiomatics and Security Architects Partners Axiomatics and Security Architects Partners present this session on the components for a successful transition from legacy access control models, such as Role-based Access Control, to one that enables dynamic authorization. Attribute Based Access Control, known as ABAC, is the new model for access control as identified by NIST […]

Building Love and Compatibility between RBAC and ABAC

As legacy data access control models such as Role Based Access Control begin to break down, industries are moving to the next generation of access control: Attribute Based Access Control (also known as “ABAC”). Some experts say these two models are at odds, and to move properly, enterprises need to “rip and replace” to a […]

From Static Roles to Dynamic Attribute-Based Authorization

This is a joint webinar together with analyst firm KuppingerCole. The webinar is hosted on KuppingerCole’s website.  Take me to the webinar Dynamic authorisation systems complement or replace the rigid role concepts through direct implementation of business-driven authorisation rules in the form of policies, and they make decisions about the access of employees, partners, and […]

The Identity & Access Management (R)evolution

Ready to evolve your access control to meet new complexities? Many organizations are currently striving to develop new strategies in their IAM vision and roadmap planning. While investments that are already in place need to be leveraged, organizations look for IAM capabilities that will make them more agile and responsive to change requests. This paper […]

Axiomatics Bootcamp ABAC 101

This “bootcamp” style webinar provides a basic overview of Attribute Based Access Control (ABAC) and how it helps solve complex data access control challenges. Enterprises and government agencies are making the shift to ABAC to help tackle specific use cases – including compliance with privacy laws, enabling inter-government agency collaboration, reduction of data leakage, combating […]

Overcoming Role Explosion Challenges with Attribute-Based Access Control

Access control has been predominantly managed with a legacy static model based on user roles – called “Role-based Access Control”, or RBAC. Enterprises that use RBAC are now experiencing role explosion – and difficulty scaling RBAC to meet the complex access control requirements of today’s workforce and the need to share, securely. Key Takeaways: Understanding an […]