Access Control Obstacles – How to Win the Challenge of IT vs. Business Units

Attribute Based Access Control (ABAC) may be the future of identity and access management (just ask analysts Gartner and KuppingerCole) but up until now there have been certain obstacles. In the main these are non-technical – and they are now being overcome.

With the launch of the Axiomatics Policy Server 6.0, Axiomatics is bridging the gap between business and IT by bringing business managers into the policy lifecycle management process – and giving them a tool whereby they can easily view the entire authorization process flow.

In this webinar we will be discussing: 

  • How the gap is being closed between process owners/policy makers and policy authors
  • How auditors, compliance managers and business line owners can get an instant overview of who can access what sensitive information
  • How collaborative policy management is being utilized by companies to gain a competitive advantage
  • How you can get the most from the new Axiomatics Policy Server user interface


Other Resources

Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.