Axiomatics Goes All-in on Orchestrated Authorization Accelerating the Adoption of Modern Enterprise Access Control
CHICAGO, IL – Axiomatics, the leader in delivering next-generation authorization today introduced the next evolution of its Orchestrated Authorization strategy. Through new capabilities and enhancements to the company’s award-winning authorization solution, Axiomatics now offers the industry’s most adaptable and scalable implementation of fine-grained access control (FGAC). This enables enterprises to centralize their authorization strategy while decentralizing policy modeling, testing, deployment, and analysis.
“With increased adoption of Zero Trust, policies related to access control and risk can no longer be confined to identity and access management (IAM) or security teams alone, but require support from the broader enterprise, including both development and the business,” said Mark Cassetta, chief product officer for Axiomatics. “The investments we’re announcing today enable IAM teams to provide consistent guardrails around policy creation, while integrating feedback from across the enterprise. That collaboration is at the heart of developing a consistent and effective Zero Trust strategy.”
New investments to the company’s Orchestrated Authorization strategy include:
- For the business – The new Policy Designer easily empowers anyone (internal or external) to create authorization policies based on IAM and enterprise security guardrails. Central teams can allow the creation of business-specific policies, while maintaining visibility and control of the overall enterprise authorization.
- For DevOps – As part of the company’s Policy-as-code offering, the new Policy Testing Framework automates policy testing and promotion as part of the DevOps process. In providing policy creators a testing framework that aligns to their identity strategy, organizations can maintain a shift left approach to their authorization policy deployments.
- For compliance – As part of an ongoing effort to maintain compliance, Contextual Authorization Query provides a list of conditions that describe who, what, when, where, why, and how information can be accessed in an application.
“With an evolving threat landscape, a ‘work from anywhere’ workforce and pressure to successfully adopt security postures like Zero Trust, more enterprises realize they have to modernize their approach to access control, which must include an effective authorization strategy,” said Vijay Bhagwati, specialist leader for Deloitte. “Orchestrated Authorization enables enterprises to modernize in the way that’s right for them, by meeting them where they are now and enabling them to scale their efforts in a way that works for their business.”
Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award-winning authorization platform to critical security implementations, such as Zero Trust or identity-first security. The world’s largest enterprises and government agencies continually depend on Axiomatics’ award-winning authorization platform to share sensitive, valuable, and regulated digital assets – but only to authorized users and in the right context. Please visit our website or follow us on LinkedIn, Twitter, and YouTube to learn more.
Corporate Communications Manager