Partner Details

Bronze Sponsor    Booth: W12

Axiomatics is the leading provider of fine-grained access control. Axiomatics’ solutions are utilized by government agencies and Global Fortune 1000 companies around the world to enable digital transformation: share and safeguard sensitive information, meet compliance requirements, and minimize data fraud. Axiomatics provides Attribute Based Access Control (ABAC) for applications, databases, Big Data, APIs and microservices. To learn more please visit: www.axiomatics.com or @axiomatics. 


 Sponsored Events

Date Title
Nov 12  ‑  Nov 14, 2018 Conference

Cyber Access Summit 2018

Willkommen zum Cyber Access Summit (CAS) 2018! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2018 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus.

Nov 12  ‑  Nov 14, 2018 Conference

Cybersecurity Leadership Summit 2018 Europe

Cybersecurity is about humans, skills and knowledge. So is the Cybersecurity Leadership Summit in Berlin (#CSLS18). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared for disaster, or even avoid the worst of it. #CSLS18 represents the new thinking that really matters for a secure digital transformation of your enterprise. At #CSLS18 you will find an impressive line-up of world-class keynote speakers, panel moderators, panellists, best practice presenters and professionals facing the same challenges as you do.

May 15  ‑  May 18, 2018 Congress

European Identity & Cloud Conference 2018

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Sep 28, 2017 Webinar

Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture - Using ABAC for APIs and Microservices

In the Digital Transformation era, businesses must be more agile than ever to adapt to constantly changing technology and regulatory landscapes and to meet the newest customer-centric initiatives. Constantly bombarded with new business requirements, software development and DevOps teams are increasingly looking into new approaches to make their applications more flexible, scalable and easier to maintain and modernize. In recent years, service-oriented architectures and microservices in particular have become the preferred method for many developers to create modular and adaptable enterprise applications that can easily scale and span multiple devices and platforms.

Sep 12  ‑  Sep 13, 2017 Conference

Consumer Identity World USA 2017

The combination of Identity & Access Management and Customer Relationship Management continues to be a core element for any digital business. Because of all the different data sources, Customer Identity & Access Management (CIAM) needs to be secure, clear and user-friendly at the same time.

Jun 01, 2017 Webinar

(Big) Data Security: Protecting Information at the Source

The ongoing Digital Transformation has profoundly changed not just IT infrastructures, but in many cases, entire business models and processes for many organizations. Digital information has become one of the most precious assets of nearly every company, and for many, it is no longer just another means of improving their business process efficiency – data has become their core competence and most valuable intellectual property.

May 09  ‑  May 12, 2017 Congress

European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.

Oct 18, 2016 Webinar

The Future of Data-Centric Security

Business boundaries are dissolving as the ability to share information improves. For example, in agile and collaborative working environments, information has to be shared efficiently and securely between various internal and external business partners, mainly via cloud services and with mobile devices. This requires extensive access to what is often critical content, stored in well-protected databases. Sharing then presents a challenge: How can sensitive data be masked from people who are not permitted to see it and deliver it securely to those who are? And how can this be done dynamically, by removing access if necessary in real-time if user authorization rapidly changes?

Apr 28, 2016 Webinar

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

Attribute Based Access Control (ABAC) solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments in which companies operate these days. However, due to the number of moving parts, it becomes harder to understand the effect a policy change might have in a complex policy set. These moving parts include the policies themselves, attribute values and the specific queries under consideration.

Sep 08, 2015 Webinar

From static roles to dynamic attribute-based authorisation - Authorise flexibly, make decisions in real time, ensure compliance

Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than what a pure role model could provide. IAM is now much more essential to operations than was the case a few years ago, and therefore requires more agility. Dynamic authorisation provides this and is the core of the new IAM framework.

Jun 23, 2015 Webinar

Beyond Database Security: Adaptive, Policy-Based Access Control for Dynamic Data Filtering and Data Masking

Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.

May 13  ‑  May 16, 2014 Congress

European Identity & Cloud Conference 2014

European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.

Nov 10, 2011 Webinar

Solving the Million Record Challenge with XACML

This webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in "big data" scenarios.

Oct 06, 2011 Webinar

XACML Made Easy: Modeling High Level Policies in XACML

In this webinar, Principal Analyst Martin Kuppinger will give an overview on how the XACML standard can be used to achieve a top-down approach to governance. Following Martin's presentation, Axiomatics' Director of Technology Partnerships and former Kuppinger Cole Analyst Felix Gaehtgens will show examples that show how easy it actually is to translate high-level access control requirements from written English into XACML policies that implement tight control. Felix will then describe how to model XACML policies to integrate risk-awareness in access controls.

May 10  ‑  May 13, 2011 Congress

European Identity Conference 2011

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Dec 16, 2010 Webinar

Using Standards to manage access to SOA and Cloud Services

In this webinar you learn how a Gateway and a Policy Server work together to apply policies to SOA and Cloud services. These policies control not only who can access the services, but also when they can access the services, how they can use the services, and how the access control decision is made. A best practice framework will be described, which scales to high-volume usage and allows reuse of these policies, promoting efficiency and reducing time-to-market and development costs. Besides KuppingerCole´s Senior Analyst Felix Gaehtgens, who will give an introduction and moderate the webinar, Gerry Gebel, David Brossard (both Axiomatics) and Mark O’Neill (Vordel) will give their view on standards-based policies for SOA and Cloud.

Nov 11, 2010 Webinar

XACML Based Authorization - Considerations for an Efficient and Flexible Architecture

Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have brought together pioneers in XACML and attribute management, Axiomatics and Radiant Logic respectively, to discuss architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architected and implemented to gain the most business value.

Oct 22, 2010 Webinar

Policy Based Access Control with XACML 3.0

Version 3 of the XACML standard could be a large stride forward towards a flexible and versatile access management. As opposed to traditional role-based access control systems, XACML is policy driven, not role driven. So, should we throw away now role-based access control? In this webinar, Kuppinger Cole´s Senior Analyst Felix Gaehtgens will talk about the improvements achieved with this new standard version and describe, how these improvements can influence current and future access control initiatives. Felix will be followed by former Burton Group Analyst and now Axiomatics Americas President Gerry Gebel, who will present together with his collegue David Brossard an impressive XACML 3.0 best practice with 200 Million users.

Dec 09, 2009 Webinar

XACML: The Holy Grail of Access Governance?

In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by different vendors and Kuppinger Cole analysts.

Dec 09, 2009 Webinar

How to Efficiently Implement SoD Controls: Which Level Works?

SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole analysts will discuss different approaches for SoD controls, with focus on their manageability and the required granularity.

Nov 05, 2009 Seminar

Unternehmensweites Zugriffsmanagement

Dieses Seminar gibt Ihnen einen umfassenden Überblick über das Entitlement Management mit XACML. Behandelt werden die grundlegenden Konzepte des XACML Standards in seinen verschiedenen Versionen bis hin zum aktuellen Entwurf der Version 3.0.

Nov 03  ‑  Nov 05, 2009 Congress

GRC-Forum 2009

Eine direkte Verknüpfung zentraler Geschäftsprozesse mit einem unternehmensweiten GRC-Management bringt klare wirtschaftliche Vorteile und reduziert die Risiken. Das GRC-Forum 2009 unterstützt Sie bei der Einführung und Verbesserung eines solchen GRC-Managements und einer darauf abgestimmten Strategie für Ihre Unternehmens-IT.

Oct 27, 2009 Webinar

The Critical Role of XACML in SOA Governance and Perimeter Web Service Security

SOA is far from dead but many organizations suffer from a severe SOA disease caused by too many enthusiastic deployments of isolated and siloed services. In this webinar, Martin Kuppinger will provide you with insights on SOA Governance, followed by Axiomatics and Intel showcasing their joint SOA security solution.

Oct 13, 2009 Webinar

The Role of Entitlement Management in Governance, Risk and Compliance Management

Modern IT infrastructures empower their users and thereby introduce new risks. The effectiveness and efficiency of control frameworks and GRC programs are therefore becoming an increasingly important focus area for IT and business managers alike. Yet, GRC initiatives tend to be reactive, striving to optimize monitoring, surveillance and auditing capabilities and the GRC overhead keeps growing. Instead we need risk-intelligence built into our IT-infrastructures. This is what Entitlement Management helps achieve. Entitlement Management provides real-time enforcement of policy-based access controls based on policy modeling implementing regulatory compliance and risk mitigation plans. This enables a shift from reactive surveillance to proactive enforcement which reduces the GRC overhead and improves control efficiency. This webinar is supported by Axiomatics.

Sep 29, 2009 Webinar

Beyond Role Based Access Control - the ABAC Approach

In this webinar we discuss the original ideas behind RBAC and why large RBAC projects often lead to role explosion problems and therefore fail in their initial ambitions. We also introduce the concept of Attribute Based Access Control (ABAC) which overcomes some of the well-known problems with RBAC and enables a fine-grained and contextual (adaptive) access control. ABAC meets the requirements of modern IT-infrastructures where dynamically changing needs must be captured and dealt with in real-time. This Webinar is supported by Axiomatics.

May 05  ‑  May 08, 2009 Congress

European Identity Conference 2009

With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Jan 20, 2009 Webinar

Entitlement Management - Business and Technical Perspectives

The question on how to control and secure access to resources has become an even more critical topic, as monolithic applications more and more become legacy and service oriented architectures (SOA) are taking over the regime. In this webinar we will give an overview of the emerging field of Entitlement Management and the XACML standard as a possibility to externalize identity management into an abstraction layer across multiple applications and services.

 Reports

Date Title Price
Mar 06, 2018

Excutive View: Axiomatics APS - 70346

Axiomatics provides a complete enterprise-grade dynamic authorization solution that can address an organization's breadth of access control needs. The Axiomatics Policy Server (APS) makes…

€190.00
Oct 04, 2017

Executive View: Axiomatics Data Security - 70345

Axiomatics provides a number of solutions for dynamic policy-driven data masking and access filtering for relational databases and Big Data stores. This suite applies an Attribute Based…

€190.00
Mar 09, 2017

Leadership Compass: Database Security - 70970

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers…

€1295.00
Sep 07, 2015

Executive View: Axiomatics – Beyond Database Security - 71270

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We…

€190.00
Dec 01, 2011

Product Report: Axiomatics Policy Management Suite - 70293

This product report covers the following Axiomatics Policy Management Suite consisting of of the following products: Axiomatics Policy Server Axiomatics Policy Auditor Axiomatics Reverse…

€195.00
Mar 11, 2010

Product Report: Axiomatics Policy Server and Policy Auditor

This product report covers the Axiomatics Policy Server and the accompanying Policy Auditor. These products fall into the category of Entitlement Management solutions. They use the XML-based…

€95.00

 Webcasts

Date Language Title
Sep 29, 2017

Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture - Using ABAC for APIs and Microservices

In the Digital Transformation era, businesses must be more agile than ever to adapt to constantly changing technology and regulatory landscapes and to meet the newest customer-centric initiatives. Constantly bombarded with new business requirements, software development and DevOps teams are incre...

Jun 02, 2017

(Big) Data Security: Protecting Information at the Source

The ongoing Digital Transformation has profoundly changed not just IT infrastructures, but in many cases, entire business models and processes for many organizations. Digital information has become one of the most precious assets of nearly every company, and for many, it is no longer just another...

Oct 19, 2016

The Future of Data-Centric Security

Business boundaries are dissolving as the ability to share information improves. For example, in agile and collaborative working environments, information has to be shared efficiently and securely between various internal and external business partners, mainly via cloud services and with mobile d...

Apr 29, 2016

Enforcing Fine Grained Access Control Policies to Meet Legal Requirements

Attribute Based Access Control (ABAC) solutions provide an organization with the power to control access to protected resources via a set of policies. These policies express the increasingly complicated legal and business environments in which companies operate these days. However, due to the nu...

Sep 09, 2015

From Static Roles to Dynamic Attribute-Based Authorisation

Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than what a p...

Jun 24, 2015

Beyond Database Security: Adaptive, Policy-Based Access Control for Dynamic Data Filtering and Data Masking

Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.

Sep 26, 2013

Authorization as a Calculated Risk

Access to corporate information often is based on binary, either/or propositions, without the context of an access request being taken into account. The level of assurance that the requesting person is who she claims to be is not determined, missing the opportunity of establishing a metric for th...

Nov 11, 2011

Solving the Million Record Challenge with XACML

This webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in "big data" scenarios.

Oct 07, 2011

XACML Made Easy: Modeling High Level Policies in XACML

In this webinar, Principal Analyst Martin Kuppinger will give an overview on how the XACML standard can be used to achieve a top-down approach to governance. Following Martin's presentation, Axiomatics' Director of Technology Partnerships and former Kuppinger Cole Analyst Felix Gaehtgens will sho...

Dec 18, 2010

Using Standards to Manage Access to SOA and Cloud Services

In this webinar you learn how a Gateway and a Policy Server work together to apply policies to SOA and Cloud services. These policies control not only who can access the services, but also when they can access the services, how they can use the services, and how the access control decision is mad...

Nov 12, 2010

XACML Based Authorization - Considerations for an Efficient and Flexible Architecture

Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have bro...

Dec 09, 2009

How to Efficiently Implement SoD Controls: Which Level Works?

SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole...

Dec 09, 2009

XACML: The Holy Grail of Access Governance?

In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by dif...

Oct 27, 2009

The Critical Role of XACML in SOA Governance and Perimeter Web Service Security

SOA is far from dead but many organizations suffer from a severe SOA disease caused by too many enthusiastic deployments of isolated and siloed services. In this webinar, Martin Kuppinger will provide you with insights on SOA Governance, followed by Axiomatics and Intel showcasing their joint SOA...

Oct 14, 2009

The Role of Entitlement Management in Governance, Risk and Compliance Management

Modern IT infrastructures empower their users and thereby introduce new risks. The effectiveness and efficiency of control frameworks and GRC programs are therefore becoming an increasingly important focus area for IT and business managers alike. Yet, GRC initiatives tend to be reactive, striving...

Sep 30, 2009

Beyond Role Based Access Control - the ABAC approach

In this webinar we discuss the original ideas behind RBAC and why large RBAC projects often lead to role explosion problems and therefore fail in their initial ambitions. We also introduce the concept of Attribute Based Access Control (ABAC) which overcomes some of the well-known problems with...

Jan 20, 2009

Entitlement Management - Business and Technical Perspectives

The question on how to control and secure access to resources has become an even more critical topic, as monolithic applications more and more become legacy and service oriented architectures (SOA) are taking over the regime. In this webinar we will give an overview of the emerging field of Entit...

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00

Information

Munich, Germany

Congress

European Identity & Cloud Conference 2017

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 09 - 12, 2017 Munich, Germany

Key Topics

  • Next-Generation Identity-Based Security and Cognitive Technologies

  • Building an Information Architecture for the Agile Enterprise

  • Privacy by Design: A Practical Approach to Reaching GDPR-Readiness

  • Delivering Value to the Connected Customer

  • Knowing & Managing the Risk of Service-Based Digital Business Technologies

  • Integrating & Securing the Internet of Things

  • Blockchain, Blockchain, Blockchain

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00