Product Report: Axiomatics Policy Server and Policy Auditor

Report Details

This product report covers the Axiomatics Policy Server and the accompanying Policy Auditor. These products fall into the category of Entitlement Management solutions. They use the XML-based XACML standard – Extensible Access Control Markup Language – to define authorisation policies and make access control decisions. Agents are available for the Java and .NET platform that work together with the Policy Server in order to enforce the policies.

Axiomatics has distinguished itself from other vendors in this space by focusing on a solution that consistently implements and complies with the XACML standard. Axiomatics internally uses XACML for policy storage and authoring as well as the XACML query/response language for Policy Enforcement Points. This is different from the approach of some other vendors who have implemented the XACML query/response language on top of existing access control engines which then also may use a different (usually simpler) model to author policies. The approach chosen by Axiomatics therefore comes with the promise of higher flexibility – but at the expense of complexity. The product comes with a graphical user interface that allows administrators to define XACML policies without having to edit raw XML files. However, a deep knowledge on XACML is still required. The accompanying Policy Auditor allows for the testing of policies and the definition of “what-if” scenarios. These can then be evaluated to verify the correctness of the defined policies against simulated requests. In that area, the direct linkage to the underlying policies causing the results is currently missing. For its deployments, Axiomatics recommends more application specific PAP interfaces with point-and-click capabilities that are provided by its professional services organisation during the deployment project once the attribute context is better known and such an interface can be drafted in a meaningful way. However, that still means some effort to reduce the inherent complexity.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Mar 11, 2010

Product Report: Axiomatics Policy Server and Policy Auditor

This product report covers the Axiomatics Policy Server and the accompanying Policy Auditor. These products fall into the category of Entitlement Management solutions. They use the XML-based XACML standard – Extensible Access Control Markup Language – to define authorisation…

€95.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Executive View

Executive View: StealthINTERCEPT® - 70367

Cyber criminals regularly exploit vulnerabilities and poor practices around Microsoft Active Directory to obtain credentials that allow them to infiltrate organizational systems, cause damage and exfiltrate data.  This report describes StealthINTERCEPT, the real-time policy…

Executive View

Executive View: StealthDEFEND® - 70366

Cyber-attacks often involve a complex process, including an insider threat element, which exploits compromised or illicit user credentials to gain access to data. StealthDEFEND is the real time file and data threat analytics component of the STEALTHbits’ Data Access Governance Suite. 

Executive View

Executive View: STEALTHbits® Products Overview - 70270

Securely governing access is increasingly important to ensure compliance as well as to defend against cyber-crime. STEALTHbits’ products provide a comprehensive set of solutions to address IT security risks covering Active Directory, Data Access Governance, Privileged Access…

Advisory Note

Advisory Note: KRIs and KPI for Access Governance - 72559

This report provides selected Key Risk Indicators (KRI) for the area of Access Governance. These indicators are easy to measure and provide organizations with a quick overview of the relevant risks and how these are changing. The indicators can be combined into a risk scorecard which then…

Executive View

Executive View: Knowledge Vault - 71412

Knowledge Vault is a cloud-based compliance platform that provides auditing, alerting, reporting and management functions for analyzing user and administrator activities across multiple data sources including Microsoft Office 365, Microsoft Azure Active Directory and popular file sharing services.

Executive View

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Die BeyondTrust PowerBroker Auditor Suite ist ein Set aus Auditing-Tools für Windows-Umgebungen. Zusammen bieten diese Tools einen einheitlichen Echtzeiteinblick sowie ein Prüfprotokoll für Zugriffe und Änderungen bezüglich Dateisystemen, SQL Server, Exchange und…

Executive View

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

BeyondTrust PowerBroker Auditor Suite is a set of auditing tools for Windows environments. Together they provide a unified real-time insight and an audit trail for file system, SQL Server, Exchange and Active Directory access and changes.

Executive View

Executive View: SAP Audit Management - 71162

Audits are a must for any organization. The massively growing number of ever-tighter regulations in the past years and the overall growing relevance and enforcement of Corporate Governance and, as part of it, Risk Management, has led to an increase in both the number and complexity of…

Executive View

Executive View: Oracle Audit Vault and Database Firewall - 70890

Oracle Audit Vault and Database Firewall monitors Oracle databases and databases from other vendors. It can detect and block threats to databases while consolidating audit data from the database firewall component and the databases themselves. It also collects audit data from other sources…

Advisory Note

Advisory Note: Working to the Business not the Auditors - 70865

There can be many reasons to why a business embarks on a journey to improve its Information Security. There is however one reason which consistently recurs: “Because the auditors says that we need to…” Regulatory requirements include penalties for non-compliance but…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Meet the Next-Generation Oracle

Oracle OpenWorld 2019 has just wrapped yesterday, and if there is a single word that can describe my impressions of it, that would be “different”. Immediately noticeable was the absence of the traditional Oracle Red spilling into the streets around the Moscone Center in San Francisco, and the reason behind it is the new corporate design system called Redwood. You can already see its colors and patterns applied to the company’s website, but more importantly, it defines new UI [...]

Latest Insights

Hot Topics

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00