Posts

Resources

Taking an identity-centric approach to a modern security architecture

Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.

News

The Impact of Context-Aware Technologies on Zero Trust Networks

Wide network perimeters worked when a single location stored information and users only accessed the network from known devices. But, as businesses update their IT architecture and priorities shift to support remote employees, adopting a ZTNA philosophy is now imperative.

KuppingerCole Market Compass report endorses Axiomatics Dynamic Authorization Suite

STOCKHOLM – 16 July 2020 – KuppingerCole has profiled Axiomatics Dynamic Authorization Suite, giving the platform high ratings across all functionalities. The Market Compass report focuses on the dynamic authorization management market and rates vendors based on the security, deployment, functionality and usability of centrally managed authorization services. 

Safeguarding an Essential Business Asset: Enterprise Data

To take advantage of enterprise data, organizations must first make that data available to key decision-makers within the company. The ability to securely access, share, and analyze data to uncover insights and meet business objectives is essential to success. Companies are storing data across different data stores and cloud platforms, ensuring only authorized users have access to the right information under the right circumstances. This is crucial. 

Axiomatics Presents Data Security Trends Emerging in 2020

More data, modern technologies and new regulations mean data security is a top priority for IT Professionals at larger enterprises with a complex structure.
Axiomatics’ data security specialists are highlighting new techniques for large enterprises to secure an ever-increasing amount of data.

“As data sources evolve and produce more data, the processes and technologies companies utilize to protect business-critical information must stay apace,” said Gerry Gebel, Axiomatics’ vice president of business development. “Modern technologies must protect information at the micro level to enable precise data access anywhere, anytime, from any device over the internet.”

VMblog shares Axiomatics 2019 Predictions: Data Security

2019 Modern Data Center Technology Prediction Series Industry executives and experts share their predictions for 2019. Gerry Gebel, our VP of Business Development, contributed this…