XACML: The Holy Grail of Access Governance?
- LANGUAGE: English DATE: Wednesday, December 09, 2009 TIME: 16:00 - 17:00 CET, 10am Eastern
In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by different vendors and Kuppinger Cole analysts.
Axiomatics is the leading provider of fine-grained access control. Axiomatics’ solutions are utilized by government agencies and Global Fortune 1000 companies around the world to enable digital transformation: share and safeguard sensitive information, meet compliance requirements, and minimize data fraud. Axiomatics provides Attribute Based Access Control (ABAC) for applications, databases, Big Data, APIs and microservices. To learn more please visit: www.axiomatics.com or @axiomatics.
Riesstraße 25 • 80992 München • Deutschland
Phone: +49 89 1 4300
Oracle Corporation provides products and services that address all aspects of corporate IT environments. Our offerings are delivered to customers worldwide through a variety of flexible and interoperable IT deployment models, including cloud-based, on-premise, or hybrid, which enable customer choice and flexibility. Our Oracle Cloud offerings provide a comprehensive and fully integrated stack of applications, platform, compute, storage and networking services in all layers of the cloud - SaaS, PaaS and IaaS to provide a cost-effective, standards-based, high-performance platform for developing, running, integrating, managing and extending business applications. In addition to utilizing these tools for modernizing their businesses, we build new and innovative applications leveraging emerging technologies such as IoT chatbots and AI/ML.
Effective Identity Governance and Administration (IGA) is becoming increasingly important as digital transformation, cloud computing, and remote working increase the scope and complexity of Identity and Access Management (IAM) to new levels. But legacy role-based access control (RBAC) solutions alone are unable to meet the changing and dynamic IGA requirements of modern enterprises.