...
Axiomatics AB     Axiomatics AB
Box 2157 • 10314 Stockholm
Phone: +46 8 515 10 240
E-Mail: info@axiomatics.com
Internet: http://www.axiomatics.com/index.php

Axiomatics is the world’s leading independent provider of Attribute Based Access Control (ABAC) for dynamic authorization solutions. We enable organizations with highly sensitive, business-critical information to safeguard and centrally manage user access through externalized, context- and policy-based authorization solutions that work within and across enterprises. For more information about Axiomatics visit www.axiomatics.com.

Congress: European Identity & Cloud Conference 2014 13.05. – 16.05.2014 , Munich, Germany
European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT.
Webinar: Solving the Million Record Challenge with XACML 10.11.2011 , 16:00 CET / 7:00am PT / 10:00am ET / 3:00pm GMT
This webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in “big data” scenarios.
Webinar: XACML Made Easy: Modeling High Level Policies in XACML 06.10.2011 , 16:00 CEST / 7:00am PT / 10:00am ET
In this webinar, Principal Analyst Martin Kuppinger will give an overview on how the XACML standard can be used to achieve a top-down approach to governance. Following Martin’s presentation, Axiomatics’ Director of Technology Partnerships and former Kuppinger Cole Analyst Felix Gaehtgens will show examples that show how easy it actually is to translate high-level access control requirements from written English into XACML policies that implement tight control. Felix will then describe how to model XACML policies to integrate risk-awareness in access controls.
Congress: European Identity Conference 2011 10.05. – 13.05.2011 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar: Using Standards to manage access to SOA and Cloud Services 16.12.2010 , 5:00pm CET, 11:00am EST
In this webinar you learn how a Gateway and a Policy Server work together to apply policies to SOA and Cloud services. These policies control not only who can access the services, but also when they can access the services, how they can use the services, and how the access control decision is made. A best practice framework will be described, which scales to high-volume usage and allows reuse of these policies, promoting efficiency and reducing time-to-market and development costs. Besides KuppingerCole�s Senior Analyst Felix Gaehtgens, who will give an introduction and moderate the webinar, Gerry Gebel, David Brossard (both Axiomatics) and Mark O�Neill (Vordel) will give their view on standards-based policies for SOA and Cloud.
Webinar: XACML Based Authorization – Considerations for an Efficient and Flexible Architecture 11.11.2010 , 17:00 CET, 11am EST
Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone – it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have brought together pioneers in XACML and attribute management, Axiomatics and Radiant Logic respectively, to discuss architectural considerations for a standards based solution to externalize authorization. KuppingerCole�s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architected and implemented to gain the most business value.
Webinar: Policy Based Access Control with XACML 3.0 22.10.2010 , 17:00 CET
Version 3 of the XACML standard could be a large stride forward towards a flexible and versatile access management. As opposed to traditional role-based access control systems, XACML is policy driven, not role driven. So, should we throw away now role-based access control? In this webinar, Kuppinger Cole�s Senior Analyst Felix Gaehtgens will talk about the improvements achieved with this new standard version and describe, how these improvements can influence current and future access control initiatives. Felix will be followed by former Burton Group Analyst and now Axiomatics Americas President Gerry Gebel, who will present together with his collegue David Brossard an impressive XACML 3.0 best practice with 200 Million users.
Webinar: XACML: The Holy Grail of Access Governance? 09.12.2009 , 16:00 – 17:00 CET, 10am Eastern
In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by different vendors and Kuppinger Cole analysts.
Webinar: How to Efficiently Implement SoD Controls: Which Level Works? 09.12.2009 , 17:00-18:00 CET, 11am Eastern
SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole analysts will discuss different approaches for SoD controls, with focus on their manageability and the required granularity.
Seminar: Unternehmensweites Zugriffsmanagement 05.11.2009 , 09:00 – 17:00 , Frankfurt
Dieses Seminar gibt Ihnen einen umfassenden �berblick �ber das Entitlement Management mit XACML. Behandelt werden die grundlegenden Konzepte des XACML Standards in seinen verschiedenen Versionen bis hin zum aktuellen Entwurf der Version 3.0.
Congress: GRC-Forum 2009 03.11. – 05.11.2009
Eine direkte Verkn�pfung zentraler Gesch�ftsprozesse mit einem unternehmensweiten GRC-Management bringt klare wirtschaftliche Vorteile und reduziert die Risiken. Das GRC-Forum 2009 unterst�tzt Sie bei der Einf�hrung und Verbesserung eines solchen GRC-Managements und einer darauf abgestimmten Strategie f�r Ihre Unternehmens-IT.
Webinar: The Critical Role of XACML in SOA Governance and Perimeter Web Service Security 27.10.2009 , 16:00 CET, 11am EDT
SOA is far from dead but many organizations suffer from a severe SOA disease caused by too many enthusiastic deployments of isolated and siloed services. In this webinar, Martin Kuppinger will provide you with insights on SOA Governance, followed by Axiomatics and Intel showcasing their joint SOA security solution.
Webinar: The Role of Entitlement Management in Governance, Risk and Compliance Management 13.10.2009 , 16:00 CEST
Modern IT infrastructures empower their users and thereby introduce new risks. The effectiveness and efficiency of control frameworks and GRC programs are therefore becoming an increasingly important focus area for IT and business managers alike. Yet, GRC initiatives tend to be reactive, striving to optimize monitoring, surveillance and auditing capabilities and the GRC overhead keeps growing. Instead we need risk-intelligence built into our IT-infrastructures. This is what Entitlement Management helps achieve. Entitlement Management provides real-time enforcement of policy-based access controls based on policy modeling implementing regulatory compliance and risk mitigation plans. This enables a shift from reactive surveillance to proactive enforcement which reduces the GRC overhead and improves control efficiency.This webinar is supported by Axiomatics.
Webinar: Beyond Role Based Access Control – the ABAC Approach 29.09.2009 , 16:00 CEST
In this webinar we discuss the original ideas behind RBAC and why large RBAC projects often lead to role explosion problems and therefore fail in their initial ambitions. We also introduce the concept of Attribute Based Access Control (ABAC) which overcomes some of the well-known problems with RBAC and enables a fine-grained and contextual (adaptive) access control. ABAC meets the requirements of modern IT-infrastructures where dynamically changing needs must be captured and dealt with in real-time. This Webinar is supported by Axiomatics.
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar: Entitlement Management – Business and Technical Perspectives 20.01.2009 , 17:00 – 17:45 CET (16:00 UTC)
The question on how to control and secure access to resources has become an even more critical topic, as monolithic applications more and more become legacy and service oriented architectures (SOA) are taking over the regime. In this webinar we will give an overview of the emerging field of Entitlement Management and the XACML standard as a possibility to externalize identity management into an abstraction layer across multiple applications and services.
Product Report: Axiomatics Policy Management Suite – 7029301.12.2011Martin Kuppinger €195.00
This product report covers the following Axiomatics Policy Management Suite consisting of of the following products: Axiomatics Policy Server Axiomatics Policy Auditor Axiomatics Reverse Query The Axiomatics Policy Management suite falls into the category of Dynamic Authorization Management Systems, which are sometimes also called Entitlement Management or Policy Management solutions . Products of that category use the XML-based XACML standard – eXtensible Access Control Markup Language – to define authorization policies and make access control decisions. Axiomatics is a leading developer of the XACML standard and makes full use of it. Axiomatics Agents are available for the Java and .NET platform as well as many security systems like several XML Gateways that work together with the Policy Server in order to enforce the policies. Axiomatics has distinguished itself from other vendors in this space by focusing on a solution that consistently implements and…

Order the report

Product Report: Axiomatics Policy Server and Policy Auditor11.03.2010Felix Gaehtgens €95.00
This product report covers the Axiomatics Policy Server and the accompanying Policy Auditor. These products fall into the category of Entitlement Management solutions. They use the XML-based XACML standard – Extensible Access Control Markup Language – to define authorisation policies and make access control decisions. Agents are available for the Java and .NET platform that work together with the Policy Server in order to enforce the policies. Axiomatics has distinguished itself from other vendors in this space by focusing on a solution that consistently implements and complies with the XACML standard. Axiomatics internally uses XACML for policy storage and authoring as well as the XACML query/response language for Policy Enforcement Points. This is different from the approach of some other vendors who have implemented the XACML query/response language on top of existing access control engines which then also may use a different (usually simpler) model to author…

Order the report

Authorization as a Calculated Risk26.09.2013
Access to corporate information often is based on binary, either/or propositions, without the context of an access request being taken into account. The level of assurance that the requesting person is who she claims to be is not determined, missing the opportunity of establishing a metric for the level of security of the connection. In the first part of this webinar, KuppingerCole Senior Analyst Dave Kearns, along with guests from Nok-Nok Labs and Certivox, will show you how going beyond passwords to a risk- and context-based authentication and authorization would help you to reach the next level, eventually even incorporating the value of the resource into the formula. If the resource is information, then the potential loss should that information be leaked also needs to be calculated. Once we�ve determined these factors, the access decision can be made: grant, deny, request further authentication or lower/raise the level of authorization. Watch
Solving the Million Record Challenge with XACML11.11.2011
This webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in “big data” scenarios. Watch
XACML Made Easy: Modeling High Level Policies in XACML07.10.2011
In this webinar, Principal Analyst Martin Kuppinger will give an overview on how the XACML standard can be used to achieve a top-down approach to governance. Following Martin’s presentation, Axiomatics’ Director of Technology Partnerships and former Kuppinger Cole Analyst Felix Gaehtgens will show examples that show how easy it actually is to translate high-level access control requirements from written English into XACML policies that implement tight control. Felix will then describe how to model XACML policies to integrate risk-awareness in access controls. Watch
Using Standards to Manage Access to SOA and Cloud Services18.12.2010
In this webinar you learn how a Gateway and a Policy Server work together to apply policies to SOA and Cloud services. These policies control not only who can access the services, but also when they can access the services, how they can use the services, and how the access control decision is made. A best practice framework will be described, which scales to high-volume usage and allows reuse of these policies, promoting efficiency and reducing time-to-market and development costs. Besides KuppingerCole�s Senior Analyst Felix Gaehtgens, who will give an introduction and moderate the webinar, Gerry Gebel, David Brossard (both Axiomatics) and Mark O�Neill (Vordel) will give their view on standards-based policies for SOA and Cloud. Watch
XACML Based Authorization – Considerations for an Efficient and Flexible Architecture12.11.2010
Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone – it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have brought together pioneers in XACML and attribute management, Axiomatics and Radiant Logic respectively, to discuss architectural considerations for a standards based solution to externalize authorization. KuppingerCole�s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architected and implemented to gain the most business value. Watch
How to Efficiently Implement SoD Controls: Which Level Works?09.12.2009
SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole analysts will discuss different approaches for SoD controls, with focus on their manageability and the required granularity. Watch
XACML: The Holy Grail of Access Governance?09.12.2009
In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by different vendors and Kuppinger Cole analysts. Watch
The Critical Role of XACML in SOA Governance and Perimeter Web Service Security27.10.2009
SOA is far from dead but many organizations suffer from a severe SOA disease caused by too many enthusiastic deployments of isolated and siloed services. In this webinar, Martin Kuppinger will provide you with insights on SOA Governance, followed by Axiomatics and Intel showcasing their joint SOA security solution. Watch
The Role of Entitlement Management in Governance, Risk and Compliance Management14.10.2009
Modern IT infrastructures empower their users and thereby introduce new risks. The effectiveness and efficiency of control frameworks and GRC programs are therefore becoming an increasingly important focus area for IT and business managers alike. Yet, GRC initiatives tend to be reactive, striving to optimize monitoring, surveillance and auditing capabilities and the GRC overhead keeps growing. Instead we need risk-intelligence built into our IT-infrastructures. This is what Entitlement Management helps achieve. Entitlement Management provides real-time enforcement of policy-based access controls based on policy modeling implementing regulatory compliance and risk mitigation plans. This enables a shift from reactive surveillance to proactive enforcement which reduces the GRC overhead and improves control efficiency.This webinar is supported by Axiomatics. Watch
Beyond Role Based Access Control – the ABAC approach30.09.2009
In this webinar we discuss the original ideas behind RBAC and why large RBAC projects often lead to role explosion problems and therefore fail in their initial ambitions. We also introduce the concept of Attribute Based Access Control (ABAC) which overcomes some of the well-known problems with RBAC and enables a fine-grained and contextual (adaptive) access control. ABAC meets the requirements of modern IT-infrastructures where dynamically changing needs must be captured and dealt with in real-time. This Webinar is supported by Axiomatics. Watch
Entitlement Management – Business and Technical Perspectives20.01.2009
The question on how to control and secure access to resources has become an even more critical topic, as monolithic applications more and more become legacy and service oriented architectures (SOA) are taking over the regime. In this webinar we will give an overview of the emerging field of Entitlement Management and the XACML standard as a possibility to externalize identity management into an abstraction layer across multiple applications and services. Watch
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.