Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

Axiomatics

Show rating breakdown
11 reviews
  • 1 profiles
  • 2 categories
Average star rating
4.1
Serving customers since
2006

Profile Name

Star Rating

4
5
2
0
0

Axiomatics Reviews

Review Filters
Profile Name
Star Rating
4
5
2
0
0
Daleep K.
DK
Daleep K.
Executive - Human Resource - HCL Technologies
12/09/2022
Validated Reviewer
Review source: G2 invite
Incentivized Review

BestTool

User interface is quite good for using this tool
ANAND V.
AV
ANAND V.
Microsoft certified Azure Data Engineer
09/27/2022
Validated Reviewer
Review source: G2 invite
Incentivized Review

Database Authorization

Axiom good security settings so I can connect database securly
Mayank P.
MP
Mayank P.
Software Engineer at Walmart Global Tech India | Please visit nohello.net/
08/02/2022
Validated Reviewer
Review source: G2 invite
Incentivized Review

data filtering and masking for relational databases

Centralized management: for all databases in the environment. Centrally manage IAM for any database, whether MySQL or graphQL. This solution manages them all. Cloud Implementation: Available so no on-premises deployment required. Integration with your organization's primary identity provider: The solution integrates with all of Pioneer's primary IAM tools, making configuration even more seamless.

About

Contact

HQ Location:
Chicago, US

Social

@axiomatics

What is Axiomatics?

The Axiomatics Orchestrated Authorization solution is an attribute-based access control (ABAC) solution designed to address enterprise application and database access challenges across any type of infrastructure – on-premises, cloud or hybrid. This is the most complete platform available for enterprise-wide roll out of ABAC, enabling enterprises to manage access based on what their corporate access policy demands. Leveraging this platform, organizations can ensure critical corporate applications, data and processes are only accessed appropriately according to policies that address what a person has access to, how much access they have, when they get access and under what conditions. These access decisions are made in real-time, reflecting real-world enterprise situations including a workforce working from anywhere, an ever-increasing number of global data privacy regulations, and sophisticated bad actors.

Details

Year Founded
2006