Protect Sensitive Data(bases): Enforce Compliance at Any Access Point

In the past, protection of sensitive data has revolved around a patchwork of complementary methods and technologies. Transparency is compromised as complexity increases and the overall solution still suffers from severe blind spots. In a database stored procedures and triggers may be used to compensate for gaps created by the role based access control (RBAC) […]

Get Started Now! Achieving Attribute Based Access Control (ABAC) for Applications with XACML

The Axiomatics Policy Server delivers dynamic, fine-grained authorization for applications. It enables organizations to enforce corporate policies throughout an entire organization based on multiple attributes – when, where, how. why and who – inline with attribute based access control (ABAC). The latest edition of APS sees extensive new authorization capabilities, while a new Express edition […]

Do You Have a Business Case for Attribute Based Access Control (ABAC)?

Gartner recently predicted that “by 2020, 70 % of enterprises will use attribute-based access control (ABAC) as the dominant mechanism to protect critical assets, up from less than 5% today.” But what does this mean for your organization?

Enabling New Business Opportunities While Balancing Risks in the Financial Services Industry

If IT empowers users to take on risks beyond corporate policy limits, the bank may have to pick up the bill. This is the reason multi-factor authorization is becoming increasingly popular in the financial services industries. It enables deployment of new services subject to strict enforcement of corporate policies. If you can define exactly who […]

Privacy Regulations – a Complex Authorization Challenge for Today’s Organizations

Efficient processing and sharing of information is essential in every organization. However, security often fails. This typically leads to either of two scenarios: Data is locked away rather than being shared among colleagues and partners, which seriously reduces efficiency and/or results in loss of business. Access to data is opened up for too many users, […]

Applying Fine-Grained Authorization to Java MVC Applications with XACML

N-tier applications can be challenging from a security perspective. Security policies impact the user interface as well as the business layer and even the data layer. Users should only be presented with relevant UIs and widgets based on their permissions. At the same time, the underlying business objects should also be protected. Externalizing authorization lets […]