+
documents

Axiomatics Resources

Learn how our Orchestrated Authorization solution helps enterprises meet the needs of today's access control challenges.

All resources
Solution Briefs

Fortune 500 Transportation Company Simplifies Access Control for 175,000 Users

One of the largest freight transportation companies in the world, with over 50,000 employees, simplifies data access for over 175,000 user accounts.

Learn more
Reports

6 Alarming Facts About Electronic Health Records

In the the case of healthcare and insurance providers, Electronic Health Records (EHR) contain even more valuable information than most data sources due to the sensitive and detailed nature of the information.

Learn more
Solution Briefs

Why Axiomatics Federal?

Axiomatics Federal, Inc. is the global independent leader in Dynamic Authorization solutions to solve complex use cases around access control for the federal government. Axiomatics helps agencies lock down confidential data and IP while securely sharing with authorized users.

Learn more
Use Cases

Security Compliance Using Externalized Authorization

Fine-grained Access Control - a new approach to Entitlements Management. For effective and ongoing compliance, businesses require integrated information risk management solutions that can protect data and manage entitlements over applications. Enhance your entitlements with Attribute Based Access Control.

Learn more
Fact Sheets

5 Fast Facts for API Access Control

APIs have become the defacto method for connecting people with data. This is great news for users: access is much smoother and often instantaneous. But for administrators controlling sensitive data, access control is a major headache. With this in mind, we’ve outlined five key API access control facts...

Learn more
Solution Briefs

Why Axiomatics?

Dynamic Authorization solutions from Axiomatics enables accelerated digital transformation, greater business agility and responsiveness, effective governance, and an improved customer experience:

Learn more
Use Cases

Federal Mission: Security Compliance using Externalized Authorization Management (EAM)

By using a centralized and externalized authorization management (EAM) service, the security accreditation process and the subsequent operations and maintenance can be shortened, saving time and money and allowing application developers to focus on the agency’s mission.

Learn more
Webinars

Externalized Dynamic Authorization in a Microservices World

Learn about deploying authorization services as a microservice and filtering data at the Policy Enforcement Point.

Learn more
Solution Briefs

Protect Critical Data and Enable Collaboration with ABAC

Attribute Based Access Control, known in brief as ABAC, is quickly becoming the standard model for organizations confronted by the need for a robust and flexible solution to today’s increasingly complex security demands.

Learn more
Solution Briefs

Why Externalized Authorization? (for Federal Government)

The Attribute Based Access Control (ABAC) model provides Externalized Dynamic Authorization by leveraging the principle that software code should be decoupled based on the function it serves. Instead of delivering applications with authorization hard-coded...

Learn more
Solution Briefs

Why You Should Externalize Your Authorization

In this piece, we cover the Key Benefits of Externalized Dynamic Authorization. We also dispel some common misconceptions developers often have.

Learn more
Solution Briefs

Axiomatics Dynamic Authorization

Axiomatics dynamic authorization with Attribute Based Access Control for applications, databases, Big Data, APIs, microservices. Axiomatics dynamic authorization is ideal for enterprises and government agencies that need to securely share information, while complying with complex and ever-evolving regulations.

Learn more
Webinars

(Big) Data Security: Protecting Information at the Source

Learn about the current challenges and trends that shape modern data protection solutions. Presented by Axiomatics & KuppingerCole.

Learn more
Webinars

Extending CA Single Sign-On with XACML Capabilities

How the Axiomatics Extension for CA Single Sign-On injects a Policy Enforcement Point (PEP) into the CA SSO Policy Server via the Single Sign-On Authorization API.

Learn more
Use Cases

Federal Mission: Dissemination and Information Sharing using ABAC

Learn more
Use Cases

Federal Government: Insider Threat Use Case

Learn more
Use Cases

Axiomatics Policy Server for the Federal Government Product Sheet

Learn more
Case Studies

Bell: Cutting through the Code to Meet Export Control Regulations

Learn more
Use Cases

Federal Government: Cross-domain ABAC Use Case

Learn more
Solution Briefs

Five Ways to Prepare for an ABAC Program

Learn more
Solution Briefs

SmartGuard® for Data – Product Sheet

SmartGuard for Big Data from Axiomatics protects big data stores against unauthorized access and exfiltration of data; only allowing authorized users or applications to access the data they’re authorized to see, at the right time, under the right conditions.

Learn more
Webinars

The Future of Data-Centric Security

Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization.

Learn more
Webinars

Authorization for Big Data: Introducing SmartGuard

In this webinar we will introduce the latest product from Axiomatics, SmartGuard(R) for Big Data, that helps organizations implement strict, fine-grained, and rich access control capabilities for data within these Big Data systems.

Learn more
Case Studies

Danish Defence – A Secure Solution for Sharing Information Electronically

Learn more