Solving the Million Record Challenge with XACML
- LANGUAGE: English DATE: Thursday, November 10, 2011 TIME: 16:00 CET / 7:00am PT / 10:00am ET / 3:00pm GMT
This webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in "big data" scenarios.
A broad range of business as well as security challenges emerge when an organization wishes to grant access to sensitive data sources – whether the intended audience is the internal workforce or an array of outside constituents. In this context, we frequently focus on databases, data warehouses, content management systems, big data, or any kind of repository that holds millions or billions of records. In this webinar, we will have a look at how you can enable a “need to share” approach by discreetly exposing the necessary data with the proper recipients, ideally based on standard XACML policies, to improve security, lower cost of operations and drive new business opportunities – and remain compliant with security, business and legal constraints.
Principal Analyst Martin Kuppinger will highlight the trend to a “need to share” world and the challenges that arise for enterprises as they need to open up their internal systems and data to an array of outside users. He will be followed by Axiomatics America’s president and former Burton Group Analyst Gerry Gebel, who will describe how XACML access policies can be implemented for “big data” scenarios, thereby enabling secure and discrete sharing of information with the target audience. The session will demonstrate how the XACML standard can be applied to a broader range of use cases which supports an organization’s efforts to implement a complete externalized authorization solution.
Axiomatics is the leading provider of fine-grained access control. Axiomatics’ solutions are utilized by government agencies and Global Fortune 1000 companies around the world to enable digital transformation: share and safeguard sensitive information, meet compliance requirements, and minimize data fraud. Axiomatics provides Attribute Based Access Control (ABAC) for applications, databases, Big Data, APIs and microservices. To learn more please visit: www.axiomatics.com or @axiomatics.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.