Subcategories from this category:

Business

A GDPR Primer: What You Need to Know

The General Data Protection Plan, known by GDPR, is new legislation that defines data protection standards and laws across the European Union. This regulation effectively repeals the Directive 95/46/EC.

Consistency is the goal for the GDPR; the legislation imposes a uniform security data law on all EU members, therefore removing most of the need for each member state to write its own data protection laws.

The complexity of the GDPR has left organizations that do business with the EU scrambling to identify exactly how they can comply with its strict data security standards while also recognizing what effect compliance has on their overall digital business initiatives. Let’s take a look a quick look into to the GDPR.

Continue reading
297 Hits
0 Comments

Peer Insights: Wisconsin IAM User Group

We’re always looking for ways to get involved with local colleagues in the IAM space. In a recent session, we met with some of our peers at the Wisconsin IAM Meetup group in Waukesha, WI. I wanted to share some detail on these local Meetups, as there is benefit for technical, business and sales roles within the IAM space.

If you’re not familiar with the IAM Meetups, initially these began as a place for Ping Identity customers to get together. But after several meetings, the groups emerged as partnerships between multiple vendors. Now the goal is to create local communities focused specifically on Identity and Access Management (IAM), and strive to be vendor agnostic and educational to better serve the attendees. They’re also a great forum to get to know other colleagues with similar IAM roles and challenges.

Continue reading
403 Hits
0 Comments

How Using ABAC Can Improve API Security in 2017

During Gartner’s recent IAM conference, I noticed an emerging conversation around the issues of API usage at the enterprise level. Enterprise adoption of APIs is viewed as an inevitable consequence of the ongoing digital transformation many IT professionals are managing.

API stands for Application Programming Interface and they help developers create applications that communicate easily with other applications and services. APIs are the backbone of any application ecosystem, which are a huge part of the trend towards digital transformation. All of those applications talking to one another are generating a huge amount of user data that enterprise companies need to be prepared to manage and secure.

Continue reading
731 Hits
0 Comments

Top Five Trends to Transform Enterprise Security in 2017

Our experts at Axiomatics got together at the end of the year to take a look at the trends in store for 2017. Some of these may sound familiar, as the era of digital transformation continues to expand. But you'll find a common theme: Marty Leamy, our Americas President said it best, “This year’s trends examine the evolving ways organizations can realize better enterprise-wide security with the exploding amounts of data that enterprises need to protect. Business executives are demanding better enterprise-wide security for all of their data, not only for regulatory compliance but also to protect their most critical assets.”

Attribute Based Access Control can help you address these areas that will challenge access control across your enterprise. Read on for the Top Five! 

Continue reading
644 Hits
0 Comments

Customer Identity, Contextual Security, and More: What We Learned at Gartner’s 2016 IAM Conference

Customer Identity, Contextual Security, and More: What We Learned at Gartner’s 2016 IAM Conference

This year’s Gartner IAM Conference was full of thoughtful keynotes and a reflection of things to come for IT professionals in 2017. Over 1500 professionals concerned with keeping customer and proprietary data more secure attended the conference last week, which took place in Las Vegas, Nevada, one of the riskier cities in the United States (if you like blackjack, that is).

Richard Holland of Eli Lilly had an opportunity to share how they’ve used various capabilities in their IAM ecosystem to drive the development of new medicines. He shared the impact of implementing ABAC in his talk, "Bringing IAM and ABAC from Strategy to Production, with the Business, in Medicines Development” and gave context to how ABAC works within the IAM ecosystem. He was one of many great speakers in the summit's expert lineup.

What’s Next in IAM?

There were many interesting conversations happening last week. Below are three crucial topics we heard discussed at length across the conference floor, that we believe are the most pressing for IAM and IT executives in 2017.

Continue reading
831 Hits
0 Comments

How Big Data is Driving Evolution in Identity and Access Management

big Data Gartner2 blogpage

What is Big Data and Why You Should Care

In a previous post, I discussed some of the security challenges awaiting companies looking to leverage the explosion of Big Data. The term itself - “Big Data” - is sort of vague. What do we mean when we say Big Data? Is it the size of the data files? The number of files?

Continue reading
1213 Hits
0 Comments

Gartner's IAM Summit: A Beginner's Guide to Digital Transformation

Gartner's IAM Summit: A Beginner's Guide to Digital Transformation

transformation blog 

Axiomatics is heading to Gartner’s annual Identity and Access Management (IAM) Summit on November 29 at Caesar's Palace in Las Vegas. By the time the event concludes on December 1st, the 1600-plus attendees will have a better understanding of the most pressing security issues facing digital leaders today. We know governance, processes and controls, and the cloud will be top of mind for most attendees, however, a number of new topics are beginning to emerge organically in the security space. The most prevalent and impactful of these is Digital Transformation.

If you’re new to the concept of IAM, or just want to be able to hold your own at cocktail hours, we’ve written an overview of the Foundations of IAM.

Tags:
Continue reading
1459 Hits
0 Comments

Security, Dynamic Authorization and the Big Data Landscape

Security, Dynamic Authorization and the Big Data Landscape

The big data landscape is, not surprisingly, big. Matt Turck’s excellent blog (mattturck.com) has good coverage on the development in this area and captures how much the landscape has grown over the past few years. The figure below, created by Turck, captures the vendors in the Big Data landscape, divided by the functional aspects of their products.

Continue reading
1408 Hits
0 Comments

We’re heading to London - see you at the Identity Management Event!

This Wednesday, November 9th, Axiomatics and other industry leaders from large enterprises and government agencies alike will attend IDM UK in London. This will be the 14th bi-annual identity management meeting held by Whitehall Media, and as we draw to a close on 2016, attendees of this summit will discuss new opportunities and trends to move forward in digital business with the incoming new year.

Continue reading
494 Hits
0 Comments

The Big Data Security Challenge

Big data is one of the “big” industry trends that is challenging enterprises these days, especially from a data security perspective. Thanks to the explosion of Big Data, the Internet of Things (IoT), and global mobilization, the way companies use, collect, store and process data has changed forever. If we look back to 2011, IT analysts IDC published the “Extracting Value from Chaos” report[1], in which they announced, “While 75% of the information in the digital universe is generated by individuals, enterprises have some liability for 80% of information in the digital universe at some point in its digital life.”

Continue reading
1136 Hits
0 Comments