Executive View: Axiomatics – Beyond Database Security - 71270

Report Details

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Sep 07, 2015

Executive View: Axiomatics – Beyond Database Security - 71270

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes.

€190.00 Get Access
Mastercard Visa PayPal Invoice

Latest Related Reports

Advisory Note

Advisory Note: Unifying RBAC and ABAC in a Dynamic Authorization Framework - 72611

Mastering authorization is critical for modern organizations  with multiple user constituencies, applications, and data types. Groups are necessary but not sufficient in complex environments. Roles are handy for adding manageability and assurance to coarse - or medium - grained …

Executive View

Executive View: HexaTier Database Security and Compliance - 71255

HexaTier provides an all-in-one database security and compliance solution across  multiple platforms with a strong focus on  cloud environments and Database-as-a-Service products.

Leadership Compass

Leadership Compass: Database Security - 70970

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers various security controls for the information itself stored and processed in database systems,…

Executive View

Executive View: Boldon James – Data Classification - 72508

Data classification is a requirement of every security framework. More importantly it should be key part of any organization’s control framework, by clearly informing the person (or system) handing the information, whether an employee of the company or an external entity, how that…

Executive View

Executive View: Axiomatics Policy Management Suite - 70895

An enterprise-grade policy administration tool for managing access control policies in the Axiomatics product suite.

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

Die FSP Identity Governance & Administration Suite ist eine Lösung zur Verwaltung des Identitäts- und Zugriffslebenszyklus und bedient somit den Markt für Identity Provisioning und Access Governance. Ein besonderer Vorteil des Produkts ist die Kombination von…

Executive View

Executive View: FSP Identity Governance & Administration Suite ORG - 71269

FSP Identity Governance & Administration Suite is a solution for managing the identity and access lifecycle, thus serving the market segment for Identity Provisioning and Access Governance. A particular strength of the product is its combination of role-based and policy-based access…

Executive View

Executive View: Oracle Database Vault - 70899

Oracle Database Vault is a specialized Privileged Access control solution for securing Oracle databases. It allows defining of different areas, called “realms”, within a database environment which can be used to protect application data from unauthorized access.  Oracle…

Executive View

Executive View: Axway API Management for Dynamic Authorization Management (DAM) - 71184

There are three major trends driving the adoption of Gateway solutions: Proliferation of inter-connected devices, The need for “bring-your-own-device” (BYOD) support and Migration to Cloud services. The economic imperative to move our databases and applications to the Cloud is…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Recapping CIW Seattle 2017

Last week we completed the opening dates on the Consumer Identity World Tour in Seattle.  To kick off the event, the Kantara Initiative held a one-day workshop to showcase the work that they do.  Kantara is an international standards organization which develops technical specifications [...]

Latest Insights

Hot Topics

Spotlight

Connected Consumer Learn more

Connected Consumer

When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00