The Future of Data-Centric Security
- LANGUAGE: English DATE: Tuesday, October 18, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Enforcing Access Control for Relational and Hadoop Big Data Systems
Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization. The data access filtering approach signifies a new generation of database security techniques, based on a combination of two robust and proven technologies: data-centric security and standards-based Attribute Based Access Control (ABAC). On the whole, this method brings database security to a new level.
In this KuppingerCole webinar, you will hear about
- Attribute-based data filtering and dynamic masking;
- The key benefits of data filtering products and their feature evolution;
- Big data governance, especially with regard to sensitive enquiries;
- The shift from “need-to-know” access control towards “need-to-share”-based principles;
- Future ABAC security without SQL interfaces and NoSQL implementations.
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will give an overview of today’s data-centric security solutions as well as their individual benefits and challenges. He will also pose the question on how organizations deal with big data and its governance concerning sensitive queries.
In the second part, Gerry Gebel, President of Axiomatics Americas, will describe the latest version of Axiomatics relational database security product, the Axiomatics Data Access Filter for Multiple Databases, and the main benefits compared to previous versions. He will also introduce a new product release, which applies the same data filtering functionality to Hadoop big data deployments.
Axiomatics is the world's leading independent provider of Attribute Based Access Control (ABAC) for dynamic authorization solutions. We enable organizations with highly sensitive, business-critical information to safeguard and centrally manage user access through externalized, context- and policy-based authorization solutions that work within and across enterprises. For more information about Axiomatics visit www.axiomatics.com.
Consumer identity and access management solutions have emerged in the recent years to meet evolving business requirements. CIAM is bringing value to the organizations regarding higher numbers of successful registrations, customer profiling, authentication variety, identity analytics, and marketing insights. Companies and public sector organizations with deployed CIAM solutions can provide better digital experiences for and gather more information about the consumers who are using their services.
The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.