Axiomatics Featured in KuppingerCole Market Compass for Policy-Based Access Management (PBAM) Learn more  

A Look Back at EIC 2018

Last week we exhibited at the 2018 European Identity & Cloud Conference in Munich. For the 12th year, the EIC conference offered best practices and discussions with more than 800 participants from worldwide companies including most of the leading vendors, analysts, end users, thought leaders, and visionaries in the Information Security and Digital Identity world – including some of our own.

On Wednesday, Solutions Architect Måns Håkansson spoke as part of the “IAM Blueprint & Compliance” track. His “How to Transform Your Data Protection Program Under GDPR” talk highlighted both the business and technical aspects of why and how a dynamic access control mechanism can help organizations secure access to sensitive information, and how policy-based authorization can play a key role in a GDPR-driven data protection program. The new

Thursday was a busy day for our VP Customer Relations, David Brossard. He presented on the Dynamic Authorization track with “Identity Solved. What next? Tackling your Toughest Authorization Challenges” (video below), spoke on the panel: How Will Authorization Look in the Future? XACML, OAuth, or Proprietary?, and presented on the API Security track with “The Value of Adding Policy Management in API Security Gateways for Implementing ABAC”.


During the show, we also announced our collaboration with Knowit Secure AB (KNOW:STO), a consultancy firm that creates unique customer values by offering digital and cross-functional solutions, and our release of the Axiomatics Extension for SharePoint.

We look forward to EIC 2019. In the meantime, catch us at the Cupertino IAM Professionals User Group Meetup (May 31st), the Chicagoland IAM User Group Meetup (June 14th), and Identiverse in Boston June 24-27th.

Archived under:
About the author

The world’s largest enterprises and government agencies continually depend on Axiomatics’ award-winning authorization platform to share sensitive, valuable and regulated digital assets – but only to authorized users and in the right context.