Partners - Axiomatics

Partners

Axiomatics partners with technology and service providers around the globe, to help augment our authorization solutions to meet your unique needs. If you're interested in becoming a partner of Axiomatics, please contact us.

Axway, a market leader in governing the flow of data to enables digital business, is a global software company with more than 11,000 public and private sector customers across 100 countries. Axway's a...ward-winning solutions span business-to-business (B2B) integration, managed file transfer, operational intelligence, and API Management — offered on-premise and in the cloud with professional and managed services. www.axway.comRead More
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business..., in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate. CA software and solutions help our customers drive enterprise-wide productivity, offer differentiated user experiences and open new growth opportunities. And we are able to deliver this value across multiple environments—mobile, private and public cloud, distributed and mainframe. Our goal is to be recognized by our customers as their critical partner in the new application economy. www.ca.com Read more about the Axiomatics Extension for CA Single Sign On here.  Read more about the Axiomatics CA API Gateway Integration here.Read More
CoreBlox
CoreBlox, a WinMill Software company, is the leading provider of enterprise security services. The CoreBlox team specializes in single sign-on (SSO), web access management solutions, SAML, identity fe...deration services, and LDAP Directory Virtualization. CoreBlox has broad experience managing, executing and supporting Identity Management deployments. CoreBlox’ commitment to service excellence has won successful clients across the Fortune 500 and in a number of key verticals including Banking, Information Technology, Insurance, Telecommunications, and the Public Sector. To learn more, visit: http://www.coreblox.com/Read More
Grabowsky
Grabowsky leads the way in the complex and challenging world of Identity Driven Security. Taking the customer needs as starting point; we jointly define a realistic route to a clear goal. Together wit...h a team of experienced professionals we guide and ensure that our clients achieve their goals. For more information visit www.grabowsky.comRead More
Heimore
Heimore Group is a Nordic consulting company specializing in IT solutions for large organizations. The company handles Business development projects from start to finish where both technical and organ...izational aspects are key. The purpose of the operations is to increase the competitive power and success of our clients by means of a deep knowledge in strategy, business development and IT. www.heimore.comRead More
i3 Consultanci
i3 are an innovative, vendor agnostic IAM specialist that will ensure your organization is always able to "provide the right people with the right access at the right time." i3 focus on providing cont...rol and visibility into user access across an organization so that the business can acquire the information they need to address compliance mandates and governance requirements. i3 provide world class expertise, deliver complete, robust, scalable solutions that facilitate quicker, safer and cost-effective implementations. i3 are based in the UK and the Middle East, see www.i3consultanci.com for more details. www.i3consultanci.comRead More
iC Consult
iC Consult is a leading vendor-independent system integrator specializing in Identity and Access Management solutions. With its branches in Germany, Austria, Switzerland, and the US, the company is ac...tively engaged in international projects for global enterprises.iC Consult provides technology consulting, design and integration of IAM products in heterogenic enterprise applications. Even after the project the company delivers ongoing support or managed services for customer specific solutions. The company's particular focus is on authorization management in complex situations in which classic role-based approaches are insufficient and finely-grained, attribute-based concepts must be employed. www.ic-consult.comRead More
IDM Works
IDMWORKS is an expert-level Identity and Access Management consultancy having successfully driven 300+ IAM projects since 2004. IDMWORKS has been recognized for their leadership in security by Gartner... and their consultants are true domain experts as recognized by their peers, customers and partners. In addition to Identity and Access Management consulting, IDMWORKS provides Data Center Migration Services, Custom Application Development and Managed Services, including mobile application monitoring capabilities. IDMWORKS is headquartered in sunny Miami, Florida. www.idmworks.comRead More
IPT is a Swiss-based IT consulting firm with over 100 consultants working on-site. IPT delivers innovative integration solutions for complex business challenges. Each project is unique, developed on t...he basis of conceptual consulting assets and assets of products partners (Appway, Axiomatics, CA Technologies, Dell Boomi, IBM, Oracle, ServiceNow, SOA software). www.ipt.ch/enRead More
Knowit
Knowit is one of the leading consultancy firms in the Nordic region. The company is quoted on the Nordic Exchange as Knowit AB and have offices in twenty locations in Sweden, five in Norway and in Hel...sinki, Tallinn and St. Petersburg. The local presence ensures deep knowledge of our clients, strong commitment and high service level compliance. www.knowit.seRead More
In Australia, KPMG has over 5,000 people, including over 380 partners, with offices around the country. Our position is built on the professionalism of our people, the quality of the Audit, Tax, and A...dvisory services we offer and the contribution we make to the wellbeing of the communities in which we live and operate. Our clients turn to us because we get the job done through our dedication to quality and our collaborative approach. Our people aim to succeed by delivering industry focused services that create genuine, sustainable value for our clients. In April 2015, KPMG Australia acquired First Point Global, a leading adviser on cyber security and implementer of enterprise and consumer Identity and Access Management solutions to clients across the Asia Pacific region. This combined group has formed to become KPMG First Point Global. For more information visit www.firstpointglobal.comRead More
Moviri
Founded by academic researchers and consultants specialized on IT Performance Optimization, Moviri now helps some of the most IT-intensive organizations in the world to manage their infrastructure. He...adquartered in Milan, Moviri has offices in Boston, New York, San Francisco and London. Moviri major references include top companies in different market segments such as Telco, Banking, Insurance, Energy, Retail and Travel, in Europe and the US. Moviri partners include vendors and service providers such as BMC, Splunk, VMware and HP. Moviri is a member of itSMF (IT Service Management Forum), UK CMG (UK Computer Meauserement Group), CMG Italia (Computer Measurement Group) and SPEC (Standard Performance Evaluation Corporation). To learn more, visit: http://www.moviri.com/Read More
Ping Identity
Ping Identity provides cloud identity security solutions to more than 800 of the world's largest companies, government organizations and cloud businesses. Ping Identity empowers 45 of the Fortune 100 ...to secure hundreds of millions of employees, customers, consumers and partners using secure, open standards like SAML, OpenID and OAuth. Businesses that depend on the Cloud rely on Ping Identity to deliver simple, proven and secure cloud identity management through single sign-on, federated identity management, mobile identity security, API security, social media integration, and centralized access control. www.pingidentity.comRead More
Prover
Prover Technology provides design automation software for the railway signaling market. Prover is also a leading provider of formal verification software for OEM partners in various application areas.... www.prover.comRead More
Radiant Logic
Radiant Logic, Inc. is the market-leading provider of virtual directory solutions for identity management and enterprise information integration. The RadiantOne Identity and Context Virtualization Pla...tform is being deployed by global enterprises to provide unified, secure access to identity and contextual views built out of heterogeneous applications and data sources. www.radiantlogic.comRead More
SailPoint
SailPoint IdentityIQ is a market-leading identity governance solution that helps organizations to mitigate risk, reduce IT costs, and ensure compliance. IdentityIQ quickly delivers tangible results wi...th a complete solution offering risk-aware compliance management, closed-loop user lifecycle management, automated user provisioning, an integrated governance model, and identity intelligence. www.sailpoint.comRead More
Sila
Sila Solutions Group is a business and technology consulting firm that has a diverse mix of consultants helping Fortune 500 companies reach their business and IT goals. Sila's enterprise-class service...s have evolved from years of experience in some of the most sophisticated and challenging environments. Within the realm of Information and Cyber Security, Sila offers innovative programs and solutions for Identity and Access Management, Governance, Risk and Compliance and Data Security. www.silasg.comRead More
  Splunk takes your machin...e data and makes sense of it. IT sense. Security sense. Business sense. Common sense. Splunk products deliver visibility and insights for IT and the business. Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Axiomatics provides out-of-the-box integration with Splunk using an application add-on to Splunk.Read More
Twobo Technologies
Twobo Technologies is a solution provider focusing solely on Identity and Access Management (IAM), helping organizations around the world use identity as a differentiator and enabler of new business o...pportunities especially in the areas of cloud computing and mobile. Our extensive experience and specialties in digital identity coupled with our partner network of best-of-breed IAM vendors helps us solve complicated security and integration problems very quickly and cost effectively. www.twobotechnologies.comRead More
Unibridge
UniBridge is a technology and vendor neutral company providing consulting services in the area of information security. The company has delivered its services since 2002 and offers senior consultants ...with market leading knowledge and experience. Unibridge has been involved in designing, building and securing the operation of several of the largest PKI/eID infrastructures in Norway including. Telenor (Zebsign),Telia (Netcom) Statoil, Norwegian Defence and other. UniBridge offers security consulting services with a special focus on:
  • Electronic ID (eID), electronic signature (eSignature) and PKI (Public Key Infrastructure)
  • Information Security Management System (ISMS) based on ISO/IEC 27001
  • GRC (Governance, Risk & Compliance)
  • ABAC solutions
To learn more, visit: https://unibridge.no/
Read More
Wisdom Design Associates
Wisdom Design Associates LLC provides Wisdom Authorization Solutions — an innovative set of business-aligned authorization systems that control the Authority to Act™ on behalf of your business. ...Targeted specifically to financial services firms, they address fine-grained authorization of transactions, with special emphasis on ensuring compliance, managing risk, and authorizing business processes and workflow on a step-by-step basis. Wisdom provides the onlyauthorization solution that allows meaningful interoperability between business partners’ authorization systems. Wisdom Authorization Solutions are uniquely well suited to address ever more complex compliance requirements, reduce costs incurred by multiple entitlement systems and support staff, and enhance client service. www.wisdomauthorization.comRead More

Latest News

In The News

SC Media Feature: Writing Authorization Policies to Secure Big Data

“Enforcing authorization directly at the data level can be incredibly powerful as it could mean minimal or no changes to the applications that are accessing the data itself,” says Jonas Iggbom. In the digital age, enterprises are accumulating and storing massive amounts of data. The more data an enterprise has stored, the more critical it […]

In The News

CSO Online Feature: Managing DevOps with Dynamic Authorization

Security technologies, like Dynamic Authorization, are an integral part of the devops methodology and should be managed in the same manner as the application itself. by Gerry Gebel In today’s on-demand and fast-changing global economy, consumers expect companies to deliver and update products and services rapidly. Many organizations have turned to a devops methodology to […]

Still have questions?

Send us an email at webinfo@axiomatics.com