XACML: The Holy Grail of Access Governance?
- LANGUAGE: English DATE: Wednesday, December 09, 2009 TIME: 16:00 - 17:00 CET, 10am Eastern
In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by different vendors and Kuppinger Cole analysts.
Axiomatics is the leading provider of fine-grained access control. Axiomatics’ solutions are utilized by government agencies and Global Fortune 1000 companies around the world to enable digital transformation: share and safeguard sensitive information, meet compliance requirements, and minimize data fraud. Axiomatics provides Attribute Based Access Control (ABAC) for applications, databases, Big Data, APIs and microservices. To learn more please visit: www.axiomatics.com or @axiomatics.
Riesstraße 25 • 80992 München • Deutschland
Phone: +49 89 1 4300
Oracle Corporation provides products and services that address all aspects of corporate IT environments. Our offerings are delivered to customers worldwide through a variety of flexible and interoperable IT deployment models, including cloud-based, on-premise, or hybrid, which enable customer choice and flexibility. Our Oracle Cloud offerings provide a comprehensive and fully integrated stack of applications, platform, compute, storage and networking services in all layers of the cloud - SaaS, PaaS and IaaS to provide a cost-effective, standards-based, high-performance platform for developing, running, integrating, managing and extending business applications. In addition to utilizing these tools for modernizing their businesses, we build new and innovative applications leveraging emerging technologies such as IoT chatbots and AI/ML.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.