Attribute Based Access Control (ABAC) Authorizing Data Access

This is a joint webinar together with our partner First Point Global. In this webinar we will demonstrate how dynamic authorisation supports innovation in the digital economy

Dynamic Access Control for Insurance Companies

In this webinar we will investigate in more detail why and how companies are adopting Attribute Based Access Control (ABAC) and learn more about the key benefits.

Protect Sensitive Data(bases): Enforce Compliance at Any Access Point

In the past, protection of sensitive data has revolved around a patchwork of complementary methods and technologies. Transparency is compromised as complexity increases and the overall solution still suffers from severe blind spots. In a database stored procedures and triggers may be used to compensate for gaps created by the role based access control (RBAC) […]

Get Started Now! Achieving Attribute Based Access Control (ABAC) for Applications with XACML

The Axiomatics Policy Server delivers dynamic, fine-grained authorization for applications. It enables organizations to enforce corporate policies throughout an entire organization based on multiple attributes – when, where, how. why and who – inline with attribute based access control (ABAC). The latest edition of APS sees extensive new authorization capabilities, while a new Express edition […]

Do You Have a Business Case for Attribute Based Access Control (ABAC)?

Gartner recently predicted that “by 2020, 70 % of enterprises will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up from less than 5% today.” But what does this mean for your organization?

Enabling New Business Opportunities While Balancing Risks in the Financial Services Industry

If IT empowers users to take on risks beyond corporate policy limits, the bank may have to pick up the bill. This is the reason multi-factor authorization is becoming increasingly popular in the financial services industries. It enables deployment of new services subject to strict enforcement of corporate policies. If you can define exactly who […]