Avassa Partners with Axiomatics to Offer Authorization at the Edge

Report this content

STOCKHOLM, SWE. 22 November 2022 – Avassa, a Swedish edge application orchestration platform provider, and Axiomatics, the leader in delivering award-winning, next-generation authorization have partnered to provide a secure and efficient solution for managing authorization in edge environments.

Having robust, consistent and reliable authorization policy compliance is key in a digital landscape. Many companies and organizations design their authorization strategy according to a zero-trust philosophy where policy granularity and control are key. When those policies are distributed across a large number of locations — at the edge — management of policies tends to become complex. Through the Avassa and Axiomatics partnership, policy orchestration at the edge becomes easy and allows companies to seamlessly extend their zero-trust approach to their edge.

“The way enterprises take on building their next-generation edge solutions is rapidly moving away from proprietary application stacks towards a platform approach based on open technologies. And as enterprises stretch their application footprints into the distributed domain and begin to scale, automating the full application lifecycle including authorization and access control becomes a critical capability for application teams. Together with team Axiomatics, we make this happen.” says Carl Moberg, CTO, and co-founder of Avassa.

As enterprises continue to deploy modern cybersecurity strategies including Zero Trust, they are challenged to ensure their efforts are applied consistently across the organization and can scale to meet future demands. Axiomatics’ attribute-based access control (ABAC) solution enables organizations to ensure access decisions are made in real-time, and provide the flexibility and scalability enterprises require to modernize their access control strategy as part of a Zero Trust initiative. With Avassa and Axiomatics, authorization is taken to the edge.

Managing and orchestrating authorization solutions at the edge are commonly seen in industries such as retail, banking, hospitality, healthcare, and property tech. While industries vary, the common denominator is to have compute resources running across many locations,” said Babak Sadighi, co-founder and head of strategy for Axiomatics. “Together with Avassa, Axiomatics provides an authorization solution that is a critical part of any Zero Trust initiative and is also orchestrated and automated, just as if it would’ve run in a centralized cloud environment.

The partnership unlocks harmonized security across the edge and the cloud respectively. A solution brief for the joint offer is found below.

Avassa
Amy Simonson, Marketing Manager, amy@avassa.io

About Avassa

Just because applications run at the edge does not mean your company needs a new operations stack. Avassa empowers companies to bridge the gap between modern containerized applications development and operations and distributed edge infrastructure. With their application orchestration platform for the edge, Avassa enables businesses to manage the lifecycle of edge applications efficiently, securely, and at the speed of software. Founded in 2020 and based in Stockholm, Sweden, Avassa aims to unlock the cloud operating model for edge applications everywhere and was named a Gartner® Cool Vendor in Edge Computing 2022. Learn more and request a free trial at avassa.io.

About Axiomatics

Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award-winning authorization platform to critical security implementations, such as Zero Trust or identity-first security. The world’s largest enterprises and government agencies continually depend on Axiomatics’ award-winning authorization platform to share sensitive, valuable, and regulated digital assets – but only to authorized users and in the right context. Please visit our website or follow us on LinkedInTwitter, and YouTube to learn more.

Tags:

Subscribe