+
2023 State of Authorization Report offers guidance on critical issues impacting authorization Learn more  
documents

Axiomatics Resources

Learn how our Orchestrated Authorization solution helps enterprises meet the needs of today's access control challenges.

All resources
Case Studies

European bank achieves proactive data security, compliance with ABAC

Learn how a global bank provided data security and achieved compliance with Attribute Based Access Control (ABAC). The bank’s authorization was historically domain-specific, meaning policies were defined, governed, and implemented by the application owners only.

Learn more
Solution Briefs

Fortune 500 Transportation Company Simplifies Access Control for 175,000 Users

One of the largest freight transportation companies in the world, with over 50,000 employees, simplifies data access for over 175,000 user accounts.

Learn more
Reports

6 Alarming Facts About Electronic Health Records

In the the case of healthcare and insurance providers, Electronic Health Records (EHR) contain even more valuable information than most data sources due to the sensitive and detailed nature of the information.

Learn more
Use Cases

Security Compliance Using Externalized Authorization

Guidance on conducting an organizational IT risk assessment and a template for determining what type of security controls are recommended.

Learn more
Fact Sheets

5 Fast Facts for API Access Control

Download our fact sheet to learn the five key API access control facts – along with a little help on how to address them.

Learn more
Solution Briefs

Why Axiomatics?

Dynamic Authorization solutions from Axiomatics enables accelerated digital transformation, greater business agility and responsiveness, effective governance, and an improved customer experience:

Learn more
Webinars

Externalized Dynamic Authorization in a Microservices World

Learn about deploying authorization services as a microservice and filtering data at the Policy Enforcement Point.

Learn more
Solution Briefs

Protect Critical Data and Enable Collaboration with ABAC

Attribute Based Access Control, known in brief as ABAC, is quickly becoming the standard model for organizations confronted by the need for a robust and flexible solution to today’s increasingly complex security demands.

Learn more
Solution Briefs

Why Externalized Authorization? (for Federal Government)

The Attribute Based Access Control (ABAC) model provides Externalized Dynamic Authorization by leveraging the principle that software code should be decoupled based on the function it serves. Instead of delivering applications with authorization hard-coded...

Learn more
Solution Briefs

Why You Should Externalize Your Authorization

In this piece, we cover the Key Benefits of Externalized Dynamic Authorization. We also dispel some common misconceptions developers often have.

Learn more
Webinars

(Big) Data Security: Protecting Information at the Source

Learn about the current challenges and trends that shape modern data protection solutions. Presented by Axiomatics & KuppingerCole.

Learn more
Webinars

Extending CA Single Sign-On with XACML Capabilities

How the Axiomatics Extension for CA Single Sign-On injects a Policy Enforcement Point (PEP) into the CA SSO Policy Server via the Single Sign-On Authorization API.

Learn more
Use Cases

Axiomatics Policy Server for the Federal Government Product Sheet

Learn more
Case Studies

Bell: Cutting through the Code to Meet Export Control Regulations

Learn more
Solution Briefs

Five Ways to Prepare for an ABAC Program

Learn more
Webinars

The Future of Data-Centric Security

Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization.

Learn more
Webinars

Authorization for Big Data: Introducing SmartGuard

In this webinar we will introduce the latest product from Axiomatics, SmartGuard(R) for Big Data, that helps organizations implement strict, fine-grained, and rich access control capabilities for data within these Big Data systems.

Learn more
Case Studies

Danish Defence – A Secure Solution for Sharing Information Electronically

Learn more
Webinars

Axiomatics Boot Camp: Testing XACML Policies Using JUnit, Eclipse, and the Abbreviated Language for Authorization (ALFA)

Experts Henrik Johansson of Knowit and David Brossard of Axiomatics provide a deep dive into testing XACML policies in this technical webinar.

Learn more
Webinars

Axiomatics Back to Basics: ABAC 101

Go back to basics on ABAC and learn the benefits of taking the ABAC path versus legacy access control approaches.

Learn more
Webinars

Proving Compliance throughout the ABAC Lifecycle

Learn how the Axiomatics Review Manager, works, and how it can help understand the effects of deployed policies on compliance requirements.

Learn more
Webinars

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

Join Axiomatics and leading analyst firm KuppingerCole to learn more about Attribute-based access control (ABAC).

Learn more
Webinars

The CISO’s Guide to Planning for ABAC Success – with Guest Speakers from Security Architects Partners

Understand how to plan for success for a new access control model at your organization and the steps in the process.

Learn more
Webinars

Healing Data Leakage in the Modern Health Care Environment

Learn how an ABAC approach can reduce the likelihood of human error and enforce granular data access controls across the ecosystem.

Learn more