Axiomatics Data Access Filter – Next Generation Data-Centric Security

This whitepaper introduces the Axiomatics Data Access Filter product family. The data access filtering approach represents a new generation of database security techniques, based on a combination of two robust and proven technologies: data-centric security and standards-based Attribute Based Access Control (ABAC). In this context, Axiomatics defines Data Access Filtering as the ability to apply access policies […]

Getting the OWASP Top Ten Right with Dynamic Authorization

The non-stop drum beat of data breaches and non-stop security issues show that a new approach to security is required writ large. Application security can be improved through fine-grained, dynamic access control. However not all application security issues are best solved with classic access control schemes. Attackers are intelligent and adaptable. For them, the access […]

Meeting Health Care Privacy Regulations with Attribute Based Access Control

Personally Identifiable Information (PII) with related sensitive health care data is increasingly being maintained in electronic records. This means PII data can be made available, reproduced and transferred with more ease than ever before. Legislation in many countries is being adapted to secure trust in institutions, to meet the confidentiality and privacy concerns that are […]

The Identity & Access Management (R)evolution

Ready to evolve your access control to meet new complexities? Many organizations are currently striving to develop new strategies in their IAM vision and roadmap planning. While investments that are already in place need to be leveraged, organizations look for IAM capabilities that will make them more agile and responsive to change requests. This paper […]

Shifting to Attribute Based Access Control

No longer is a company’s data restricted by the boundaries imposed by physical office space and a local area network. Data sharing and collaboration transcend organizational borders and older models of access control cannot keep pace. They simply fail, and often with disastrous results. The static assignment of user permissions either directly or by way […]

Adding Fine-Grained Authorization to CA Single Sign-On

The Axiomatics Extension for CA Single Sign-On uses the Authorization API to seamlessly insert XACML capabilities into the product to add fine-grained authorization capabilities. Read more about how to add this integration on to your CA Single Sign-On installation. Key Takeaways: How the Axiomatics Extension for CA Single Sign-On allows you to combine Single Sign-On’s […]