What we do
We provide dynamic access control solutions to help our customers manage their new information security challenges. Old, static access control models radically fail when cloud computing, big data and...
View Articlenew home
{layerslider id="14"} What we do We provide dynamic access control solutions to help our customers manage their new information security challenges. Old, static access control models radically fail...
View ArticleExpired
This action has expired. The reason for this might be that we have limited space and the cap for registration has been reached or that the event has already taken place. If you would like to get in...
View ArticleUnderstanding XACML combining algorithms
Posted on July 15 2014 What is a combining algorithm? The XACML policy language uses three structural elements: policy sets, policies, and rules. A policy set can contain any number of policies and...
View ArticleExtending the XACML specification
Posted on August 12, 2014 The eXtensible Access Control Markup Language - or XACML offers a standardized way to provide granular and scalable authorization solution across the enterprise application...
View ArticleXACML vs. Drools: A Comparison
Posted on September 3, 2014 Enterprises have several options when considering how to address the authorization function for in-house developed applications. In this post, we will compare and contrast...
View ArticleThank you for downloading
Thank you for downloading. Having any questions regarding our resources? please email us at marketing@axiomatics.com.
View ArticleThank you for signing up
Thank you for signing up. You will receive a confirmation email with further details. If you would like to get in touch with us,please email marketing@axiomatics.com.
View ArticleSubscription Center
Thank you for your time. If you would like to get in touch with us,please email marketing@axiomatics.com.
View Article