Volume 6: Gartner IAM, Authorization Use Cases, Story of Axiomatics & Isolated Authorization
Hello, everyone!
As November settles in, we’re officially in the heart of fall and already dreaming of holiday gatherings. So, pour yourself a warm drink, and dive into our latest newsletter which looks at:
Be sure to follow us on LinkedIn if you don’t already to see what the team gets up to in Texas.
Enjoying this newsletter? Share it with your network! While you are at it, hit the subscribe button at the top of this page. ???
We’re going to the Gartner IAM Summit in Texas ya’ll!
Come say hello to the Axiomatics team at booth 342 so you can learn why the world’s leading banks, government agencies, and manufacturers continue to work with Axiomatics.?
Plus, our CTO, David Brossard , will be speaking at not one, but two sessions at the conference.
1?? Axiomatics: Authorization Trek - The Final Frontier?
Date: Monday, December 9th
Time: 6:10 - 6:30 pm CST
Description: Onboard most Enterprises, identity management and authentication have been solved, yet authorization remains alien. Join us on a journey across the cybersecurity galaxy as we explore the foundations of authorization, its evolution, and future trends. We'll discuss the latest standards development such as OpenID AuthZEN and ALFA 2.0, the Klingon of authorization, and offer a framework to engage stakeholders and implement a successful authorization strategy. Key takeaways will help you breach the Great Barrier of Authorization and boldly go where no identity architect has gone before!
2?? AuthZEN: the “OpenID Connect” of Authorization
Date: Wednesday, December 11th
Time: 3:30 - 4:00 pm CST
Description: This session will describe the state of modern authorization, review the API, and show off interoperable implementations. With AuthZEN, IAM teams can confidently externalize and standardize authorization across their application estate without being locked in to a proprietary API.
Book a meeting ahead of time to talk with us about how our solution can benefit your organization. In only 15 minutes over a cup of coffee our team can show you:
The Story of Axiomatics
Back in 2006, a team of researchers came across a gap in access control that needed filling. Traditional models were too rigid for the dynamic needs of modern B2B applications.
Enter attribute-based access control (ABAC) and the creation of Axiomatics.
Introducing ABAC in an RBAC dominated world wasn’t just about technology — it was about educating and inspiring change. We faced our challenges head-on, driven by our commitment to providing solutions that truly work.
Listening to our customers has always been our guiding principle. Their feedback has driven innovations like the Contextual Authorization Query (CAQ), which streamlines entitlement reviews and enhances data filtering. From our early U.S. successes to our global expansion, each step has shaped us into the leaders we are today.
What sets us apart? ??
It’s not just about cutting-edge technology. It's about our adaptability and our customer-first approach. Nearly two decades in, we’ve polished our solutions for both simple and complex applications.
Ready to dive deeper into our story and see how we’re leading the way in secure, scalable access control? ?? Read the full article here.
A Full Guided Tour of Policy Companion
This past month, our VP Customer Relations, Matt Luckett , and Senior Professional Services Consultant, Dave Matthews , went live to detail Policy Companion — our Generative AI tool for anyone working with authorization and access control policies.
In this session they cover:
? How you can learn to author policies without being an expert
? How Policy Companion can accelerate policy authoring
? How Policy Companion analyzes existing policies and address gaps
Upcoming Event ???
Make sure to join us later this month where we’ll be going live on November 21st at 9 am EST.?Discover how leading industries protect their applications and data with tailored authorization strategies that adapt to today’s fast-evolving security needs.
In this session, our experts will showcase real-world use cases from top industries, including:
Don't Miss Out! Secure your spot today and RSVP to stay ahead of the curve in access management.
Haunting Disadvantages of Isolated Authorization ??
In the spirit of Halloween, our latest blog post highlights a lurking monster under the bed in IT infrastructure: isolated authorization. Explore the pitfalls of isolated authorization while drawing chilling comparisons to classic horror scenarios – like wandering a haunted house with a thousand hidden rooms, each with its own access rules.
While isolated authorization can seem scary, there’s no need to fear. Policy-driven authorization is the treat.?
Rather than splintering control, policy-driven authorization centralizes access management, supporting consistent Zero Trust principles, regulatory compliance, and cost efficiency. By streamlining policies, your organization can avoid the horrors of oversight and safeguard sensitive information without the nightmare of isolated systems.
Want to learn more? Check it out here.
??? From the Archives: What are entitlements and how can they be enforced?
There are many definitions of entitlements, each with small differences between them. No matter how you define an entitlement, how they can be enforced, and the limitations around them are the same.
The limitations around entitlements are due to the fact they are a very specific identity-centric element in an overall access control strategy.
This means that their over- or under-use can provide a myriad of issues for an enterprise, opening them up to risk.
So, what are the limitations of entitlements and how can they be solved? We answer this question and more in one of our most popular blogs.
?? Subscribe to our newsletter to stay up-to-date and make sure to follow us for all things authorization.