Posts

News

How to Fast-Track Insights Without Sacrificing Data Privacy or Security

The security and regulatory risks surrounding data lakes and big data require a modern approach to enterprise access control. Gerry Gebel, Vice President of Business Development at Axiomatics, discusses how a multi-dimensional security model that enables fine-grained access control can help IT teams analyze data securely, whether on-premise or in the cloud. 

CGN: How agencies are modernizing IT infrastructure with attribute based access control

Federal agencies have had to rapidly evolve operations, manage risk and digitize their workforce due to COVID-19.  They have also been working to modernize their IT infrastructure, move additional resources to the cloud, deal with capacity issues and protect systems against serious vulnerabilities and sensitive information from getting into the wrong hands.

Why Policy-Based Access Control Is Critical for Securing Data in the Cloud

As organizations shift more resources to the cloud, they require modern technologies to meet the security requirements of a multi-cloud approach. Here, Gerry Gebel, VP of Business Development at Axiomatics talks about the importance of a policy-based approach for securing cloud-based data resources.

The Impact of Context-Aware Technologies on Zero Trust Networks

Wide network perimeters worked when a single location stored information and users only accessed the network from known devices. But, as businesses update their IT architecture and priorities shift to support remote employees, adopting a ZTNA philosophy is now imperative.

KuppingerCole Market Compass report endorses Axiomatics Dynamic Authorization Suite

STOCKHOLM – 16 July 2020 – KuppingerCole has profiled Axiomatics Dynamic Authorization Suite, giving the platform high ratings across all functionalities. The Market Compass report focuses on the dynamic authorization management market and rates vendors based on the security, deployment, functionality and usability of centrally managed authorization services. 

Safeguarding an Essential Business Asset: Enterprise Data

To take advantage of enterprise data, organizations must first make that data available to key decision-makers within the company. The ability to securely access, share, and analyze data to uncover insights and meet business objectives is essential to success. Companies are storing data across different data stores and cloud platforms, ensuring only authorized users have access to the right information under the right circumstances. This is crucial. 

Resources

Securing Critical Enterprise Applications and APIs with Dynamic, Risk-based Authorization and Governance

Until now, Identity Governance and Administration (IGA) and ABAC tools have largely been deployed and operated independently of each other. However, there is significant value…