+
CrowdStrike joins the Axiomatics partner community with risk-based authorization for enterprise Learn more  
documents

Axiomatics Resources : Webinars

Learn how our Orchestrated Authorization solution helps enterprises meet the needs of today's access control challenges.

All resources

Improve security, consistency and enforce access rules across applications

Joint webinar with Axiomatics and Radiant Logic on how to improve security, consistency and enforce access rules across applications by ABAC and federated identity.

Learn more

Speed, Privacy and Security – Getting to the Value of Data in Apache Spark

Axiomatics webinar: Speed, Privacy and Security - SmartGuard Apache Spark using SmartGuard for Data.

Learn more

Modern Web Application Security for “Cloud First” Initiatives

Web Access Management (WAM) is critical to your organization because it’s often the hub of access. And so is your “Cloud First” strategy.

Learn more

Controlling Access to Business-Critical Data

In this webinar, Axiomatics experts reveal how to use dynamic authorization to secure the content of data stores.

Learn more

Using the Power of Federated Identity and Dynamic Authorization to Streamline Access Control – with Radiant Logic

Joint webinar with Axiomatics and Radiant Logic: Using the Power of Federated Identity and Dynamic Authorization to Streamline Access Control.

Learn more

5 Hidden Pitfalls of DIY Access Control Development and How to Avoid Them

Learn about building vs buying dynamic authorization software, including competitive, opportunity & risk associated costs.

Learn more

Streamline Access Control with Federated Identity and ABAC

This webinar features Axiomatics and Radiant Logic, and discusses how to Streamline Access Control with Federated Identity and ABAC.

Learn more

Externalized Dynamic Authorization in a Microservices World

Learn about deploying authorization services as a microservice and filtering data at the Policy Enforcement Point.

Learn more

(Big) Data Security: Protecting Information at the Source

Learn about the current challenges and trends that shape modern data protection solutions. Presented by Axiomatics & KuppingerCole.

Learn more

Extending CA Single Sign-On with XACML Capabilities

How the Axiomatics Extension for CA Single Sign-On injects a Policy Enforcement Point (PEP) into the CA SSO Policy Server via the Single Sign-On Authorization API.

Learn more

The Future of Data-Centric Security

Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization.

Learn more

Authorization for Big Data: Introducing SmartGuard

In this webinar we will introduce the latest product from Axiomatics, SmartGuard(R) for Big Data, that helps organizations implement strict, fine-grained, and rich access control capabilities for data within these Big Data systems.

Learn more

Axiomatics Boot Camp: Testing XACML Policies Using JUnit, Eclipse, and the Abbreviated Language for Authorization (ALFA)

Experts Henrik Johansson of Knowit and David Brossard of Axiomatics provide a deep dive into testing XACML policies in this technical webinar.

Learn more

Axiomatics Back to Basics: ABAC 101

Go back to basics on ABAC and learn the benefits of taking the ABAC path versus legacy access control approaches.

Learn more

Proving Compliance throughout the ABAC Lifecycle

Learn how the Axiomatics Review Manager, works, and how it can help understand the effects of deployed policies on compliance requirements.

Learn more

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

Join Axiomatics and leading analyst firm KuppingerCole to learn more about Attribute-based access control (ABAC).

Learn more