
Axiomatics Resources
Learn how our Orchestrated Authorization solution helps enterprises meet the needs of today's access control challenges.
Streamline Access Control with Federated Identity and ABAC
This webinar features Axiomatics and Radiant Logic, and discusses how to Streamline Access Control with Federated Identity and ABAC.
Learn moreEuropean bank achieves proactive data security, compliance with ABAC
Learn how a global bank provided data security and achieved compliance with Attribute Based Access Control (ABAC). The bank’s authorization was historically domain-specific, meaning policies were defined, governed, and implemented by the application owners only.
Learn moreFortune 500 Transportation Company Simplifies Access Control for 175,000 Users
One of the largest freight transportation companies in the world, with over 50,000 employees, simplifies data access for over 175,000 user accounts.
Learn more6 Alarming Facts About Electronic Health Records
In the the case of healthcare and insurance providers, Electronic Health Records (EHR) contain even more valuable information than most data sources due to the sensitive and detailed nature of the information.
Learn moreSecurity Compliance Using Externalized Authorization
Guidance on conducting an organizational IT risk assessment and a template for determining what type of security controls are recommended.
Learn more5 Fast Facts for API Access Control
Download our fact sheet to learn the five key API access control facts – along with a little help on how to address them.
Learn moreWhy Axiomatics?
Dynamic Authorization solutions from Axiomatics enables accelerated digital transformation, greater business agility and responsiveness, effective governance, and an improved customer experience:
Learn moreExternalized Dynamic Authorization in a Microservices World
Learn about deploying authorization services as a microservice and filtering data at the Policy Enforcement Point.
Learn moreProtect Critical Data and Enable Collaboration with ABAC
Attribute Based Access Control, known in brief as ABAC, is quickly becoming the standard model for organizations confronted by the need for a robust and flexible solution to today’s increasingly complex security demands.
Learn moreWhy Externalized Authorization? (for Federal Government)
The Attribute Based Access Control (ABAC) model provides Externalized Dynamic Authorization by leveraging the principle that software code should be decoupled based on the function it serves. Instead of delivering applications with authorization hard-coded...
Learn moreWhy You Should Externalize Your Authorization
In this piece, we cover the Key Benefits of Externalized Dynamic Authorization. We also dispel some common misconceptions developers often have.
Learn more(Big) Data Security: Protecting Information at the Source
Learn about the current challenges and trends that shape modern data protection solutions. Presented by Axiomatics & KuppingerCole.
Learn moreExtending CA Single Sign-On with XACML Capabilities
How the Axiomatics Extension for CA Single Sign-On injects a Policy Enforcement Point (PEP) into the CA SSO Policy Server via the Single Sign-On Authorization API.
Learn moreThe Future of Data-Centric Security
Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization.
Learn moreAuthorization for Big Data: Introducing SmartGuard
In this webinar we will introduce the latest product from Axiomatics, SmartGuard(R) for Big Data, that helps organizations implement strict, fine-grained, and rich access control capabilities for data within these Big Data systems.
Learn moreAxiomatics Boot Camp: Testing XACML Policies Using JUnit, Eclipse, and the Abbreviated Language for Authorization (ALFA)
Experts Henrik Johansson of Knowit and David Brossard of Axiomatics provide a deep dive into testing XACML policies in this technical webinar.
Learn moreAxiomatics Back to Basics: ABAC 101
Go back to basics on ABAC and learn the benefits of taking the ABAC path versus legacy access control approaches.
Learn moreProving Compliance throughout the ABAC Lifecycle
Learn how the Axiomatics Review Manager, works, and how it can help understand the effects of deployed policies on compliance requirements.
Learn moreEnforcing Fine Grained Access Control Policies to Meet Legal Requirements
Join Axiomatics and leading analyst firm KuppingerCole to learn more about Attribute-based access control (ABAC).
Learn moreThe CISO’s Guide to Planning for ABAC Success – with Guest Speakers from Security Architects Partners
Understand how to plan for success for a new access control model at your organization and the steps in the process.
Learn more