Why Axiomatics?

As the global independent leader in Dynamic Authorization solutions, our people, expertise, and our best-in-class software set us apart. Customers come to us to solve complex use cases around access control to applications, databases, Big Data, microservices, and APIs. Through a policy-based approach to dynamic authorization that utilizes the Attribute Based Access Control (ABAC) model, […]

Federal Mission: Security Compliance using Externalized Authorization Management (EAM)

United States federal agencies are beholden to myriad regulations and standards, some of the most notable of which are the FIPS Publication 200 and the NIST Special Publication 800-53. Both documents, in combination, “ensure that appropriate security requirements and security controls are applied to all federal information and information systems.” These documents offer guidance on […]

The Evolution of RBAC Models to Next-Generation ABAC

The management and administration of roles to set permission for access control have become challenging enterprises of all sizes. In this whitepaper, you’ll learn why Role Based Access Control is becoming unmanageable (called “role explosion”), and why this legacy access control mechanism must evolve. Enter ABAC. ABAC builds upon existing roles, and expands the range […]

Toxic Pairs, Role Explosion, and Evolution of ABAC

A Practical Guide for Fine-Grained Access Control It’s 2016 and the days of Sherlock Holmes are long gone. Yet mysteries and puzzles abound more than ever in our increasingly complex world. IT is no stranger to these complexities. Managing access control and entitlements has become an impossible task where role-based access control has failed us […]

The CISO's Guide to Planning for ABAC Success

A webinar with Axiomatics and Security Architects Partners Axiomatics and Security Architects Partners present this session on the components for a successful transition from legacy access control models, such as Role-based Access Control, to one that enables dynamic authorization. Attribute Based Access Control, known as ABAC, is the new model for access control as identified by NIST […]