Partner Details
Silver Sponsor
Gamla Brogatan 23 B • 11120 Stockholm • Sweden
Phone: +46 8 515 10 240
Email: info@axiomatics.com
Internet: https://www.axiomatics.com/index.php
Axiomatics is the leading provider of fine-grained access control. Axiomatics’ solutions are utilized by government agencies and Global Fortune 1000 companies around the world to enable digital transformation: share and safeguard sensitive information, meet compliance requirements, and minimize data fraud. Axiomatics provides Attribute Based Access Control (ABAC) for applications, databases, Big Data, APIs and microservices. To learn more please visit: www.axiomatics.com or @axiomatics.
Sponsored Events
Date | Title |
---|---|
Aug 19, 2021 |
Webinar
Zero Trust Through Dynamic Authorization and Policy Driven AccessAs workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure. |
Jul 21, 2021 |
Virtual Event
The Access Management Playbook: Securing Today's OrganizationsManaging the granting and revoking of access based on user workflows is paramount to enabling effective risk management. Enforcing distinct access control requires an interconnected access management system that aligns with company policies and regulations. |
May 27, 2021 |
Virtual Event
Enabling the Future of Identity and Access ManagementJoin the KCLive Event on the future of identity and access management to learn how to implement an interconnected IAM architecture designed for the post-pandemic era. |
Nov 12 ‑ Nov 14, 2018 |
Conference
Cyber Access Summit 2018Willkommen zum Cyber Access Summit (CAS) 2018! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2018 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus. |
Nov 12 ‑ Nov 14, 2018 |
Conference
Cybersecurity Leadership Summit 2018 EuropeCybersecurity is about humans, skills and knowledge. So is the Cybersecurity Leadership Summit in Berlin (#CSLS18). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared for disaster, or even avoid the worst of it. #CSLS18 represents the new thinking that really matters for a secure digital transformation of your enterprise. At #CSLS18 you will find an impressive line-up of world-class keynote speakers, panel moderators, panellists, best practice presenters and professionals facing the same challenges as you do. |
May 15 ‑ May 18, 2018 |
Congress
European Identity & Cloud Conference 2018Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Sep 28, 2017 |
Webinar
Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture - Using ABAC for APIs and MicroservicesIn the Digital Transformation era, businesses must be more agile than ever to adapt to constantly changing technology and regulatory landscapes and to meet the newest customer-centric initiatives. Constantly bombarded with new business requirements, software development and DevOps teams are increasingly looking into new approaches to make their applications more flexible, scalable and easier to maintain and modernize. In recent years, service-oriented architectures and microservices in particular have become the preferred method for many developers to create modular and adaptable enterprise applications that can easily scale and span multiple devices and platforms. |
Sep 12 ‑ Sep 13, 2017 |
Conference
Consumer Identity World USA 2017The combination of Identity & Access Management and Customer Relationship Management continues to be a core element for any digital business. Because of all the different data sources, Customer Identity & Access Management (CIAM) needs to be secure, clear and user-friendly at the same time. |
Jun 01, 2017 |
Webinar
(Big) Data Security: Protecting Information at the SourceThe ongoing Digital Transformation has profoundly changed not just IT infrastructures, but in many cases, entire business models and processes for many organizations. Digital information has become one of the most precious assets of nearly every company, and for many, it is no longer just another means of improving their business process efficiency – data has become their core competence and most valuable intellectual property. |
May 09 ‑ May 12, 2017 |
Congress
European Identity & Cloud Conference 2017European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security. |
Oct 18, 2016 |
Webinar
The Future of Data-Centric SecurityBusiness boundaries are dissolving as the ability to share information improves. For example, in agile and collaborative working environments, information has to be shared efficiently and securely between various internal and external business partners, mainly via cloud services and with mobile devices. This requires extensive access to what is often critical content, stored in well-protected databases. Sharing then presents a challenge: How can sensitive data be masked from people who are not permitted to see it and deliver it securely to those who are? And how can this be done dynamically, by removing access if necessary in real-time if user authorization rapidly changes? |
Apr 28, 2016 |
Webinar
Enforcing Fine Grained Access Control Policies to Meet Legal RequirementsAttribute Based Access Control (ABAC) solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments in which companies operate these days. However, due to the number of moving parts, it becomes harder to understand the effect a policy change might have in a complex policy set. These moving parts include the policies themselves, attribute values and the specific queries under consideration. |
Sep 08, 2015 |
Webinar
From static roles to dynamic attribute-based authorisation - Authorise flexibly, make decisions in real time, ensure complianceTraditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than what a pure role model could provide. IAM is now much more essential to operations than was the case a few years ago, and therefore requires more agility. Dynamic authorisation provides this and is the core of the new IAM framework. |
Jun 23, 2015 |
Webinar
Beyond Database Security: Adaptive, Policy-Based Access Control for Dynamic Data Filtering and Data MaskingControlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues. |
May 13 ‑ May 16, 2014 |
Congress
European Identity & Cloud Conference 2014European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT. |
Nov 10, 2011 |
Webinar
Solving the Million Record Challenge with XACMLThis webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in "big data" scenarios. |
Oct 06, 2011 |
Webinar
XACML Made Easy: Modeling High Level Policies in XACMLIn this webinar, Principal Analyst Martin Kuppinger will give an overview on how the XACML standard can be used to achieve a top-down approach to governance. Following Martin's presentation, Axiomatics' Director of Technology Partnerships and former Kuppinger Cole Analyst Felix Gaehtgens will show examples that show how easy it actually is to translate high-level access control requirements from written English into XACML policies that implement tight control. Felix will then describe how to model XACML policies to integrate risk-awareness in access controls. |
May 10 ‑ May 13, 2011 |
Congress
European Identity Conference 2011With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
Dec 16, 2010 |
Webinar
Using Standards to manage access to SOA and Cloud ServicesIn this webinar you learn how a Gateway and a Policy Server work together to apply policies to SOA and Cloud services. These policies control not only who can access the services, but also when they can access the services, how they can use the services, and how the access control decision is made. A best practice framework will be described, which scales to high-volume usage and allows reuse of these policies, promoting efficiency and reducing time-to-market and development costs. Besides KuppingerCole´s Senior Analyst Felix Gaehtgens, who will give an introduction and moderate the webinar, Gerry Gebel, David Brossard (both Axiomatics) and Mark O’Neill (Vordel) will give their view on standards-based policies for SOA and Cloud. |
Nov 11, 2010 |
Webinar
XACML Based Authorization - Considerations for an Efficient and Flexible ArchitectureAttribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have brought together pioneers in XACML and attribute management, Axiomatics and Radiant Logic respectively, to discuss architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architected and implemented to gain the most business value. |
Oct 22, 2010 |
Webinar
Policy Based Access Control with XACML 3.0Version 3 of the XACML standard could be a large stride forward towards a flexible and versatile access management. As opposed to traditional role-based access control systems, XACML is policy driven, not role driven. So, should we throw away now role-based access control? In this webinar, Kuppinger Cole´s Senior Analyst Felix Gaehtgens will talk about the improvements achieved with this new standard version and describe, how these improvements can influence current and future access control initiatives. Felix will be followed by former Burton Group Analyst and now Axiomatics Americas President Gerry Gebel, who will present together with his collegue David Brossard an impressive XACML 3.0 best practice with 200 Million users. |
Dec 09, 2009 |
Webinar
XACML: The Holy Grail of Access Governance?In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by different vendors and Kuppinger Cole analysts. |
Dec 09, 2009 |
Webinar
How to Efficiently Implement SoD Controls: Which Level Works?SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole analysts will discuss different approaches for SoD controls, with focus on their manageability and the required granularity. |
Nov 05, 2009 |
Seminar
Unternehmensweites ZugriffsmanagementDieses Seminar gibt Ihnen einen umfassenden Überblick über das Entitlement Management mit XACML. Behandelt werden die grundlegenden Konzepte des XACML Standards in seinen verschiedenen Versionen bis hin zum aktuellen Entwurf der Version 3.0. |
Nov 03 ‑ Nov 05, 2009 |
Congress
GRC-Forum 2009Eine direkte Verknüpfung zentraler Geschäftsprozesse mit einem unternehmensweiten GRC-Management bringt klare wirtschaftliche Vorteile und reduziert die Risiken. Das GRC-Forum 2009 unterstützt Sie bei der Einführung und Verbesserung eines solchen GRC-Managements und einer darauf abgestimmten Strategie für Ihre Unternehmens-IT. |
Oct 27, 2009 |
Webinar
The Critical Role of XACML in SOA Governance and Perimeter Web Service SecuritySOA is far from dead but many organizations suffer from a severe SOA disease caused by too many enthusiastic deployments of isolated and siloed services. In this webinar, Martin Kuppinger will provide you with insights on SOA Governance, followed by Axiomatics and Intel showcasing their joint SOA security solution. |
Oct 13, 2009 |
Webinar
The Role of Entitlement Management in Governance, Risk and Compliance ManagementModern IT infrastructures empower their users and thereby introduce new risks. The effectiveness and efficiency of control frameworks and GRC programs are therefore becoming an increasingly important focus area for IT and business managers alike. Yet, GRC initiatives tend to be reactive, striving to optimize monitoring, surveillance and auditing capabilities and the GRC overhead keeps growing. Instead we need risk-intelligence built into our IT-infrastructures. This is what Entitlement Management helps achieve. Entitlement Management provides real-time enforcement of policy-based access controls based on policy modeling implementing regulatory compliance and risk mitigation plans. This enables a shift from reactive surveillance to proactive enforcement which reduces the GRC overhead and improves control efficiency. This webinar is supported by Axiomatics. |
Sep 29, 2009 |
Webinar
Beyond Role Based Access Control - the ABAC ApproachIn this webinar we discuss the original ideas behind RBAC and why large RBAC projects often lead to role explosion problems and therefore fail in their initial ambitions. We also introduce the concept of Attribute Based Access Control (ABAC) which overcomes some of the well-known problems with RBAC and enables a fine-grained and contextual (adaptive) access control. ABAC meets the requirements of modern IT-infrastructures where dynamically changing needs must be captured and dealt with in real-time. This Webinar is supported by Axiomatics. |
May 05 ‑ May 08, 2009 |
Congress
European Identity Conference 2009With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
Jan 20, 2009 |
Webinar
Entitlement Management - Business and Technical PerspectivesThe question on how to control and secure access to resources has become an even more critical topic, as monolithic applications more and more become legacy and service oriented architectures (SOA) are taking over the regime. In this webinar we will give an overview of the emerging field of Entitlement Management and the XACML standard as a possibility to externalize identity management into an abstraction layer across multiple applications and services. |
Reports
Date | Title | Price |
---|---|---|
Sep 07, 2015 |
Executive View: Axiomatics – Beyond Database Security - 71270Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We… |
€190.00 |
Dec 01, 2011 |
Product Report: Axiomatics Policy Management Suite - 70293This product report covers the following Axiomatics Policy Management Suite consisting of of the following products: Axiomatics Policy Server Axiomatics Policy Auditor Axiomatics Reverse… |
€195.00 |
Mar 11, 2010 |
Product Report: Axiomatics Policy Server and Policy AuditorThis product report covers the Axiomatics Policy Server and the accompanying Policy Auditor. These products fall into the category of Entitlement Management solutions. They use the XML-based… |
€95.00 |
Videos
Date | Language | Title |
---|---|---|
Aug 20, 2021 |
![]() |
Zero Trust Through Dynamic Authorization and Policy Driven AccessAs workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to... |
Jul 22, 2021 |
![]() |
Panel: The Future of Access Management |
May 27, 2021 |
![]() |
Panel - What's Next for IAM: Building for the Future |
Sep 29, 2017 |
![]() |
Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture - Using ABAC for APIs and MicroservicesIn the Digital Transformation era, businesses must be more agile than ever to adapt to constantly changing technology and regulatory landscapes and to meet the newest customer-centric initiatives. Constantly bombarded with new business requirements, software development and DevOps teams are incre... |
Jun 02, 2017 |
![]() |
(Big) Data Security: Protecting Information at the SourceThe ongoing Digital Transformation has profoundly changed not just IT infrastructures, but in many cases, entire business models and processes for many organizations. Digital information has become one of the most precious assets of nearly every company, and for many, it is no longer just another... |
Oct 19, 2016 |
![]() |
The Future of Data-Centric SecurityBusiness boundaries are dissolving as the ability to share information improves. For example, in agile and collaborative working environments, information has to be shared efficiently and securely between various internal and external business partners, mainly via cloud services and with mobile d... |
Apr 29, 2016 |
![]() |
Enforcing Fine Grained Access Control Policies to Meet Legal RequirementsAttribute Based Access Control (ABAC) solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments in which companies operate these days. However, due to the nu... |
Sep 09, 2015 |
![]() |
From Static Roles to Dynamic Attribute-Based AuthorisationTraditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than what a p... |
Jun 24, 2015 |
![]() |
Beyond Database Security: Adaptive, Policy-Based Access Control for Dynamic Data Filtering and Data MaskingControlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues. |
Sep 26, 2013 |
![]() |
Authorization as a Calculated RiskAccess to corporate information often is based on binary, either/or propositions, without the context of an access request being taken into account. The level of assurance that the requesting person is who she claims to be is not determined, missing the opportunity of establishing a metric for th... |
Nov 11, 2011 |
![]() |
Solving the Million Record Challenge with XACMLThis webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in "big data" scenarios. |
Oct 07, 2011 |
![]() |
XACML Made Easy: Modeling High Level Policies in XACMLIn this webinar, Principal Analyst Martin Kuppinger will give an overview on how the XACML standard can be used to achieve a top-down approach to governance. Following Martin's presentation, Axiomatics' Director of Technology Partnerships and former Kuppinger Cole Analyst Felix Gaehtgens will sho... |
Dec 18, 2010 |
![]() |
Using Standards to Manage Access to SOA and Cloud ServicesIn this webinar you learn how a Gateway and a Policy Server work together to apply policies to SOA and Cloud services. These policies control not only who can access the services, but also when they can access the services, how they can use the services, and how the access control decision is mad... |
Nov 12, 2010 |
![]() |
XACML Based Authorization - Considerations for an Efficient and Flexible ArchitectureAttribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have bro... |
Dec 09, 2009 |
![]() |
How to Efficiently Implement SoD Controls: Which Level Works?SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole... |
Dec 09, 2009 |
![]() |
XACML: The Holy Grail of Access Governance?In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by dif... |
Oct 27, 2009 |
![]() |
The Critical Role of XACML in SOA Governance and Perimeter Web Service SecuritySOA is far from dead but many organizations suffer from a severe SOA disease caused by too many enthusiastic deployments of isolated and siloed services. In this webinar, Martin Kuppinger will provide you with insights on SOA Governance, followed by Axiomatics and Intel showcasing their joint SOA... |
Oct 14, 2009 |
![]() |
The Role of Entitlement Management in Governance, Risk and Compliance ManagementModern IT infrastructures empower their users and thereby introduce new risks. The effectiveness and efficiency of control frameworks and GRC programs are therefore becoming an increasingly important focus area for IT and business managers alike. Yet, GRC initiatives tend to be reactive, striving... |
Sep 30, 2009 |
![]() |
Beyond Role Based Access Control - the ABAC approachIn this webinar we discuss the original ideas behind RBAC and why large RBAC projects often lead to role explosion problems and therefore fail in their initial ambitions. We also introduce the concept of Attribute Based Access Control (ABAC) which overcomes some of the well-known problems with... |
Jan 20, 2009 |
![]() |
Entitlement Management - Business and Technical PerspectivesThe question on how to control and secure access to resources has become an even more critical topic, as monolithic applications more and more become legacy and service oriented architectures (SOA) are taking over the regime. In this webinar we will give an overview of the emerging field of Entit... |
Become a Sponsor
European Identity Conference 2009
- Language:
- English
- Registration fee:
-
€1980.00
$2475.00
S$3168.00
21780.00 kr
INVOICE
- Contact person:
-
Ms. Bettina Buthmann
bb@kuppingercole.com
- May 05 - 08, 2009 Munich
Key Topics
How can we help you