English   Deutsch
22.10.2010
17:00 CET

Policy Based Access Control with XACML 3.0

Version 3 of the XACML standard could be a large stride forward towards a flexible and versatile access management. As opposed to traditional role-based access control systems, XACML is policy driven, not role driven. So, should we throw away now role-based access control? In this webinar, Kuppinger Cole´s Senior Analyst Felix Gaehtgens will talk about the improvements achieved with this new standard version and describe, how these improvements can influence current and future access control initiatives. Felix will be followed by former Burton Group Analyst and now Axiomatics Americas President Gerry Gebel, who will present together with his collegue David Brossard an impressive XACML 3.0 best practice with 200 Million users.

Axiomatics has been a pioneer in creating attribute based access control (ABAC) solutions based on the relatively new access control markup language XACML. With so far limited  practical experience, data on performance and scalability of solutions based on this standard have been rare and many professionals have been in doubt regarding it´s maturity.  

"ABAC and XACML can be trusted as proven and scalable options. Extensive evaluations that have been carried out by our recent customers in the financial industries have clearly shown that our XACML based technology is mature and extremely scalable.", says Axiomatic´s Finn Frisch., describing their latest project which supports a giant number of 200 million users.

Considering the fact, that externalized authorization significantly reduces time-to-market when new services are to be deployed, ABAC would make it much easier, to rapidly and securely provision new services with sensitive information. In this webinar, KuppingerCole's Senior Analyst Felix Gaehtgens will talk about the potentials of XACML 3.0, and how it could revolutionise the way that access management and access compliance is handled.

Following Felix, Axiomatics' Gerry Gebel and David Brossard will show how Axiomatics is utilizing the features of its newly launched entitlement management solution, APS 4.0, with the new XACML 3.0 standard, in the world's largest deployment of XACML based authorization to date. When fully deployed the system will protect hundreds of applications, utilize thousands of rules and attributes and support more than 200 million users.

Speakers

David Brossard David Brossard
Solutions Architect
Axiomatics AB

David joined Axiomatics in January 2010 to focus on customer deployments and pre-sales. Previously, he had worked for 5 years at BT (British Telecom) in the United Kingdom in the Security Architectures Center. His main area of expertise is SOA security and governance. David has published several... MORE 
Felix Gaehtgens Felix Gaehtgens
Senior Analyst
Kuppinger Cole

MORE 
Gerry Gebel Gerry Gebel
President
Axiomatics Americas

Gerry is responsible for sales, marketing and business development for the Americas region. In addition, he contributes to product strategy and manages Axiomatics’ global partner relations. Prior to joining Axiomatics, Gerry was Vice President and Service Director for Burton Group’s... MORE 


Gold Sponsor

Axiomatics AB Axiomatics AB
Box 2157 • 10314 Stockholm
Phone: +46 8 515 10 240
E-Mail: info@axiomatics.com
Internet: http://www.axiomatics.com/index.php

Axiomatics is the world's leading independent provider of Attribute Based Access Control (ABAC) for dynamic authorization solutions. We enable organizations with highly sensitive, business-critical information to safeguard and centrally manage user access through externalized, context- and policy-based authorization solutions that work within and across enterprises. For more information about Axiomatics visit www.axiomatics.com.


top
Download
Webinar Presentation Felix Gaehtgens
Webinar Presentation Axiomatics
Information
Language
English

Date
22.10.2010
17:00 CET

Contact person
Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
Partners
More events
Identity and Access Management: Where to start?
Many organizations – of all sizes – still have no or only a rudimentary IAM in place. When looking at IAM, it quickly turns out that this is about...
Extend your existing AD to the Cloud. How to enable the new ABC: the Agile Business - Connected
Most organizations use Microsoft Active Directory as a strategic element of their on-premise network infrastructure. However, handling external...
How to stop the Insider Threat: Protect yourself from Privileged Users
The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about...
All current events
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole