All resources sponsored by:

Axiomatics

10 Matches
Protecting Microservices and APIs with ABAC, OAuth and OpenID Connect
sponsored by Axiomatics
WHITE PAPER:This resource outlines a set of examples where security standards work together in addressing requirements that are difficult or impossible to meet by using OAuth or OIDC alone. Find out how your organization can combine security capabilities to separate privacy concerns and more.
Posted: 17 Jun 2018 | Published: 15 Jun 2018
Get This Now


When Making a Build vs. Buy Decision About IAM and Dynamic Authorization, Remember DIY's Hidden Costs
sponsored by Axiomatics
RESOURCE:If you're looking for IAM and dynamic authorization for your applications, it's not always clear whether you should build a solution in-house, or purchase from an outside vendor. In this resource take a look at the hidden costs of DIY to help decide which option is best for your organization.
Posted: 13 Jun 2018 | Published: 13 Jun 2018
Get This Now


The Key to API Security
sponsored by Axiomatics
WHITE PAPER:The management and enforcement of authentication and authorization is critical to securing APIs, and Attributed Based Access Control (ABAC) can do just that. Download this resource to learn about the features of ABAC, and how it can benefit your organization.
Posted: 13 Jun 2018 | Published: 13 Jun 2018
Get This Now


Build vs Buy: Dynamic Authorization Solutions
sponsored by Axiomatics
WHITE PAPER:Download this review, for an assessment of the technological, price point, time-to-market, and ongoing maintenance and enhancement advantages of utilizing a dedicated security partner versus attempting to replicate a secure, scalable, and comprehensive solution in-house.
Posted: 12 Jun 2018 | Published: 12 Jun 2018
Get This Now


Externalized Dynamic Authorization in a MicroServices World
sponsored by Axiomatics
RESOURCE:This 3-part resource describes how your organization can apply Externalized Dynamic Authorization to an API and a microservices architecture that uses OAuth 2.0 flows or OpenID Connect (OIDC).
Posted: 20 Feb 2018 | Published: 20 Feb 2018
Get This Now


The Evolution of RBAC Models to Next-Generation ABAC
sponsored by Axiomatics
WHITE PAPER:In order to provide secure data access, organizations can no longer afford to define authorization policies based solely on a user's role. Access this white paper to learn how attributed based access control (ABAC) ABAC builds up existing roles and expands the range of attributes used in the authorization process for stronger data protection.
Posted: 14 Feb 2018 | Published: 14 Feb 2018
Get This Now


What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER:Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016
Get This Now


Why Externalize?
sponsored by Axiomatics
WHITE PAPER:This resource provides insight into the attribute based access control (ABAC) model, explores how it impacts authentication and application security, and reveals 4 common misconceptions.
Posted: 08 Feb 2018 | Published: 08 Feb 2018
Get This Now


5 Fast Facts for API Access Control
sponsored by Axiomatics
WHITE PAPER:With user access oftentimes being instantaneous, it is difficult for administrators to control sensitive data. This resource outlines 5 key API access control facts as well as insight into how to address the challenges.
Posted: 07 Feb 2018 | Published: 07 Feb 2018
Get This Now


Bell Helicopter Enables Attribute-Based Access Control and Authorization
sponsored by Axiomatics
CASE STUDY:In this case study, find out how Bell Helicopter used a scalable attribute-based access control (ABAC) platform to prevent unauthorized access and handle their sensitive and regulated data throughout the enterprise.
Posted: 07 Feb 2018 | Published: 31 Dec 2015
Get This Now


10 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement