
Abstract
This is the second of a series of reports on specific vendor offerings that enterprises should consider as they modernize their Identity and Access Management (IAM) foundation. In this report, we’ll review Axiomatics, a tenured company focused on externalizing user access control policy and decisions from applications in multi-cloud environments.
More and more, access decisions are being made at runtime based on the best data that can be quickly assembled. Such runtime authorization mechanisms often implement what’s called Attribute-Based Access Control (ABAC) methods for determining access rights when a user or agent is attempting to interact with specific applications and data. Using an ABAC model as its foundation, Axiomatics’ mission is to “securely connect people and information through runtime authorization” with a vision to “enable every organization in the world to enforce Zero Trust access.” Nearly 100 percent of the company’s customer base is comprised of Global 1000 organizations, showing a proclivity for helping to solve complex access issues in large enterprises across all the major market verticals.
In this report, we explore in detail the Axiomatics Authorization Hub and set of tools that bring externalized authorization to bear. We’ll then conclude with a set of pragmatic recommendations and an enterprise action plan for improving enterprise access control capabilities via Axiomatics deployment.