+
  • Attribute Based Access Control

Four Role-based Access Control (RBAC) Limitations and How to Fix Them

Adopting attributed-based access control (ABAC) enables enterprises to extend existing roles using attributes and policies CHICAGO, IL – September 23, 2021 – In the advent...

Why US Businesses Are Adopting a Zero Trust Model With Technology

Cybersecurity continues to gain prominence as a national security issue for countries worldwide. An emerging way to improve security measures for both government agencies and...

How to Fast-Track Insights Without Sacrificing Data Privacy or Security

The security and regulatory risks surrounding data lakes and big data require a modern approach to enterprise access control. Gerry Gebel, Vice President of Business Development at Axiomatics, discusses how a multi-dimensional security model that enables fine-grained access control can help IT teams analyze data securely, whether on-premise or in the cloud. 

CGN: How agencies are modernizing IT infrastructure with attribute based access control

Federal agencies have had to rapidly evolve operations, manage risk and digitize their workforce due to COVID-19.  They have also been working to modernize their IT infrastructure, move additional resources to the cloud, deal with capacity issues and protect systems against serious vulnerabilities and sensitive information from getting into the wrong hands.

Why Policy-Based Access Control Is Critical for Securing Data in the Cloud

As organizations shift more resources to the cloud, they require modern technologies to meet the security requirements of a multi-cloud approach. Here, Gerry Gebel, VP of Business Development at Axiomatics talks about the importance of a policy-based approach for securing cloud-based data resources.

How zero trust network access secures remote work environments

A 2019 report surveying more than 170 prequalified federal government and industry IT experts about zero-trust security capabilities showed agencies are narrowing their security defenses, using a ZTNA approach to manage access to their information resources.

The Impact of Context-Aware Technologies on Zero Trust Networks

Wide network perimeters worked when a single location stored information and users only accessed the network from known devices. But, as businesses update their IT architecture and priorities shift to support remote employees, adopting a ZTNA philosophy is now imperative.

KuppingerCole Market Compass report endorses Axiomatics Dynamic Authorization Suite

STOCKHOLM – 16 July 2020 - KuppingerCole has profiled Axiomatics Dynamic Authorization Suite, giving the platform high ratings across all functionalities. The Market Compass report focuses on the dynamic authorization management market and rates vendors based on the security, deployment, functionality and usability of centrally managed authorization services. 

Safeguarding an Essential Business Asset: Enterprise Data

To take advantage of enterprise data, organizations must first make that data available to key decision-makers within the company. The ability to securely access, share, and analyze data to uncover insights and meet business objectives is essential to success. Companies are storing data across different data stores and cloud platforms, ensuring only authorized users have access to the right information under the right circumstances. This is crucial. 

Axiomatics Latest Updates Improve Delivery of Dynamic Authorization for Hybrid, Cloud Environments

Axiomatics is improving the delivery of dynamic authorization for multiple assets across hybrid, cloud and on-prem environments. IDN looks at the latest Axiomatics Policy Server...

Axiomatics Joins Google Cloud Connect Partner Program

Axiomatics Joins Google Cloud Connect Partner Program Axiomatics Cloud Native Authorization Engine Offers Flexible Authorization for Cloud Deployments, Bringing Fine-Grained Access Control to Developers using the Google Platform

Axiomatics Announces Technology Partnership with Tableau

New Integration enables Fine-Grained Authorization to Data in the Tableau Platform CHICAGO – April 16, 2019 – Axiomatics, the leader in externalized, fine-grained dynamic authorization,...

VMblog shares Axiomatics 2019 Predictions: Data Security

2019 Modern Data Center Technology Prediction Series Industry executives and experts share their predictions for 2019. Gerry Gebel, our VP of Business Development, contributed this...

IT Pro Portal:Critical Data Security Trends for 2019 and beyond

An article by Gerry Gebel in www.itproportal.com; IT Pro Portal covers the Critical Data Security Trends for 2019 and beyond.  It originally appeared here. Critical...

Cloud Computing Ranks: The number one 2019 career skill

Article originally posted in VM Virtual Machine. Cloud computing ranks: The number one 2019 career skill 2019 is the Year of the Pig, but will...

CloudPost: Seven Big Data Security Trends of 2019

2018 was a monumental year for cloud technologies and data security. As businesses moved application workflows to the cloud, they were forced to manage new...

DZone: Why Attribute-Based Access Control – The Evolution from RBAC to ABAC in Data Access Control

Learn more about the evolution from RBAC to ABAC in data access control. A feature article in DZone by Måns Håkansson Evolving from ACLs and...

JAXenter: Predictions for the new year – Crucial data security trends and challenges for 2019

2019 has only just begun – what will the year hold? Ring in the new year with tech predictions from the experts. Today, Pablo Giambiagi,...

Insights Success: Axiomatics Feature

Axiomatics: An Independent Leader in Dynamic Authorization Solutions Axiomatics was featured in Insights Success as the leader in dynamic authorization. Read the full article here:...

Axiomatics Unveils Critical Data Security Trends for 2019

CHICAGO – December 5, 2018 – The top 2019 data security trends were released today by Axiomatics, the leader in externalized, fine-grained dynamic authorization. This...

Data Center Post: The Stark Reality of Insider Threat

Data Center Post: The Stark Reality of Insider Threat, and What Your Business Can do about It. By Gerry Gebel, Vice President of Business Development at Axiomatics Modern...

archTIS Enhances Offering, Expands Market via New Partnership with Axiomatics

In a press release issued on November 15, 2018, archTIS Enhances Offering, Expands Market via New Partnership with Axiomatics. archTIS Limited (ASX:AR9, archTIS or the...

Måns Håkansson to Speak at Prestigious KuppingerCole Cyber Access Summit 2018

CHICAGO (November 07, 2018) — Axiomatics, the leader in externalized, fine-grained dynamic authorization, today announced that Måns Håkansson, solutions architect, will speak at two sessions at...

TMCnet InfoTech Spotlight: Federated Identity Management and Dynamic Authorization

TMCnet InfoTech Spotlight: Combining Federated Identity Management with Dynamic Authorization The virtualization of nearly everything digital is pushing more and more applications, services, storage, and...

Axiomatics Federal, Inc. Finalist for American Security Today’s 2018 ‘ASTORS’ Homeland Security Awards

RESTON, VA (November 1, 2018) – Axiomatics Federal, Inc., the leader in fine-grained dynamic authorization for customers and partners of the federal government, today announced...

Enhancing Cloud Security for AWS Deployments

As organizations continue to move their IT infrastructure to AWS or other cloud providers, addressing complex access control use cases with dynamic authorization is essential....

Axiomatics’ Experts Gerry Gebel and Jonas Iggbom Present “API Security: When OAuth Is Not Enough” at API World 2018

Axiomatics’ Experts Address the Inherent Limitations of OAuth by Augmenting Access Control with Fine-Grained Authorization CHICAGO – September 4, 2018 – Axiomatics, the leader in externalized,...

Axiomatics Joins the MuleSoft Technology Partner Program

Fine-grained Authorization for MuleSoft’s Anypoint Platform will further Enable Organizations to Deploy Secure Applications Faster CHICAGO – August 21, 2018 – Axiomatics, the leader in externalized...

CSO Online Feature: Securing Continuous Deployment for Applications in the Cloud

Container orchestration tools lack the necessary security controls but attribute based access control (ABAC) can help by Gerry Gebel Application containers have quickly gained popularity...

CSO Online Feature: When Security and Privacy Overrule Convenience

Organizations can enable end-to-end API security with OAuth, OpenID Connect and ABAC by Gerry Gebel for CSO Online Modern technology is constantly making our lives...

DevOps.com Feature: DevOps: Making the Development Cycle More Secure

By Gerry Gebel for DevOps.com Fundamentally, DevOps is all about speed and agility. Customers expect companies to deliver and update applications at an accelerated pace...

CSO Online Feature: Connecting ABAC to Identity Governance and Administration to Extend Access Control Capabilities

Enterprises need an approach to improve synergies between existing IAM technologies As applications, data and infrastructure continue moving into the cloud, the need for authorization...

Axiomatics and Saviynt Unite to Offer Integrated Externalized Dynamic Authorization and Identity Governance and Administration Solutions, an Industry First

New Integration Combines Technologies to Deliver Advanced Solutions to Enhance Security as Businesses Continue to Move to the Cloud CHICAGO – June 25, 2018 –...

CloudPOST Feature: Establishing a Secure Cloud Infrastructure with Dynamic Authorization

By David Brossard for CloudPOST Today, it is imperative for businesses to increase scalability and enable collaboration among development teams to help solve complex challenges, all...

DZone Feature: The Journey Toward Securing the Cloud

by Gerry Gebel for DZone.com If you are in the process of moving to the cloud or still in the planning stages, the need to...

Axiomatics and XMS Solutions Form Strategic Reseller Partnership

XMS will offer the Axiomatics Dynamic Authorization Suite for SharePoint, applications, data stores, APIs and microservices. CHICAGO – May 22, 2018 – Axiomatics, the leader in...

Axiomatics Launches Dynamic Authorization Extension for Microsoft® SharePoint

The Axiomatics Extension for SharePoint was developed in collaboration with Knowit Secure. By extending dynamic fine-grained access control using an Attribute Based Access Control framework into SharePoint

Axiomatics to Sponsor and Exhibit at IAM CONNECT 2018 in Berlin

Generali Germany Informatik Services Presents Case Study Demonstrating the Success of Axiomatics Dynamic Authorization Engine CHICAGO (March 6, 2018) – Axiomatics, the leader in fine-grained...

Axiomatics Policy Server Endorsed in Second KuppingerCole Analyst Report

KuppingerCole Executive View Report Highlights Axiomatics Policy Server as an Industry-Leading Suite of Solutions to Manage an Attribute Based Access Control Policy Lifecycle CHICAGO (March...

DZone Feature: How to Create and Maintain Database Security Using Dynamic Authorization

With organizations now relying so much on data, they should look towards a fine-grained policy-based approach to control access to critical information. By Gerry Gebel...

ReadITQuik Interviews Niklas Jakobsson, Axiomatics CEO

This week, read Niklas Jakobsson, CEO at Axiomatics talk about security services organizations should use to access data and resources and how the first line...

DZone Feature | Cybersecurity: The Do’s and Don’ts

In this post, we take a look at what security and dev teams should both do, and not do, to create a security-friendly environment. By...

Axiomatics Identifies Transformative Enterprise Security Trends for 2018

DevSecOps, Securely Sharing Data and Regulatory Compliance Highlight the Trends to Watch for Enterprise Security in 2018 CHICAGO (December 13, 2017) – Axiomatics, the leader in...

CSO Online Feature: Managing DevOps with Dynamic Authorization

Security technologies, like Dynamic Authorization, are an integral part of the devops methodology and should be managed in the same manner as the application itself....

CSO Online Feature: Enhancing API Security, Dynamic Authorization to Protect Sensitive Data

Enhancing API Security: Dynamic Authorization to Protect Sensitive Data (September 11, 2017) Axiomatics’ Gerry Gebel featured in CSO Online API Gateways effectively manage the authentication...

Axiomatics Welcomes Marty Leamy as President of the Americas

CHICAGO – November 15, 2016. Axiomatics welcomes Marty Leamy as President of the Americas. Leamy is a 25-year-plus technology industry veteran, holding senior management positions...

Dynamic, Fine-Grained Authorization Secures Big Data

CHICAGO – October 18, 2016 –Axiomatics, the leader in fine-grained dynamic authorization, today announced the launch of the Axiomatics SmartGuardTM for Big Data. SmartGuard for...

Axiomatics Welcomes Niklas Jakobsson

CHICAGO, August 18, 2016.  Axiomatics welcomes Niklas Jakobsson as CEO. Babak Sadighi, Founder, will continue to focus on his role with the board of directors....

Axiomatics Announces Compliance and Reporting Functionality

Axiomatics Review Manager helps Enforce, Audit, and Review Individual Data Access Rights CHICAGO and STOCKHOLM, April 19, 2016. Axiomatics, the leader in fine-grained externalized authorization,...

Axiomatics Announces 90 Percent Revenue Growth in 2015

Company poised for increased adoption of ABAC across industries CHICAGO and STOCKHOLM, February 2, 2016. Axiomatics, a leader in enterprise software for access control, today...

Axiomatics Announces Robust Improvements to its Data Access Filter v 1.5

Extends Database and Operating System Coverage and Enables Advanced Security Functionality CHICAGO AND STOCKHOLM, December 10, 2015. Axiomatics today announced version 1.5 of the Axiomatics...

Press Release: Axiomatics Policy Server 6.2

Axiomatics Brings Multi-project Capabilities to Fine-grained Access Control CHICAGO and STOCKHOLM, November 17, 2015. Today Axiomatics, the leader in fine-grained access control, announces a new...