Healing Data Leakage in the Modern Health Care Environment

The move to electronic records (EHR) in the health care industry – across providers, insurance companies and a multitude of third parties – has increased the speed of sharing records, and in theory, the quality of care provided to individuals. However, this instant-access ecosystem also introduces increased risk – as the more users that have […]

Axiomatics Boot Camp: ABAC and XACML Made Easy – Using ALFA to Write Fine-Grained Authorization Policies

Does the promise of attribute-based access control sound like magic? Don’t worry, you don’t need to be a wizard to write efficient and secure ABAC policies. In this bootcamp webinar, we will show you how you can easily write ABAC policies straight from within your IDE by using ALFA, the Abbreviated Language for Authorization. We […]

Building Love and Compatibility between RBAC and ABAC

As legacy data access control models such as Role Based Access Control begin to break down, industries are moving to the next generation of access control: Attribute Based Access Control (also known as “ABAC”). Some experts say these two models are at odds, and to move properly, enterprises need to “rip and replace” to a […]

New Years Detox – Eliminating Toxic Combinations in your Access Control

As access control has become more complex, the assignment of roles has exploded out of control, making it harder to eliminate toxic combinations of roles that end up allowing access that should actually be denied. For example, the same person entering a trade should not be allowed to confirm it as well, as this can lead […]

Axiomatics Boot Camp – Database Filtering and Policy Creation

Data Access Filtering is the ability to apply access policies to database requests to ensure that only authorized individuals are allowed to read and write data, and to further protect this data by dynamically masking or redacting it so that sensitive data is never exposed. In this Axiomatics Boot Camp session, we will cover drivers […]

Centralizing the Code – Separating Authorization Logic from Apps

For any business in the Fortune 1000 – such as health care, insurance, banking, pharmaceuticals and manufacturing – the need to shift beyond legacy role-based access control models becomes more immediate with every data breach. There’s one trend that’s crossing industries – separating hard-coded authorization logic from applications: externalizing authorization and using a policy-based approach […]