Gerry Gebel

Opinions expressed by ICN authors are their own.

Gerry Gebel is the vice president of business development at Axiomatics. He is responsible for sales, customer support, marketing, and business development for the Americas region. In addition, he contributes to product strategy and manages partner relationships.

Before joining Axiomatics, Gerry was vice president and service director for Burton Group’s identity management practice. He covered topics such as authorization, federation, identity and access governance, user provisioning and other identify management (IAM) topics. In 2007, he facilitated the first ever XACML interoperability demonstration at the Catalyst conference.

In addition, Gerry has nearly 15 years' experience in the financial services industry including architecture development, engineering, integration, and support of Internet, distributed, and mainframe systems.

The opinions expressed in this blog are those of Gerry Gebel and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Enhancing cloud security for AWS deployments

Securing continuous deployment for applications in the cloud

Securing continuous deployment for applications in the cloud

Container orchestration tools lack the necessary security controls but attribute based access control (ABAC) can help.

Connecting ABAC to identity governance and administration to extend access control capabilities

Connecting ABAC to identity governance and administration to extend access control capabilities

Enterprises need an approach to improve synergies between existing IAM technologies.

When security and privacy overrule convenience

When security and privacy overrule convenience

Organizations can enable end-to-end API security with OAuth, OpenID Connect and ABAC.

Why you need both authorization and authentication

Why you need both authorization and authentication

How to effectively manage IAM controls to secure critical assets.

How important defense in depth will be as the lines between security layers blur

How important defense in depth will be as the lines between security layers blur

What key roles defense in depth and layered security will play in the digital age.

Striking a balance between customer experience, security and privacy

Striking a balance between customer experience, security and privacy

Everyone is a consumer with Consumer Identity and Access Management (CIAM).

Dynamic authorization: a solution to navigating GDPR

Dynamic authorization: a solution to navigating GDPR

With less than five months until the implementation of GDPR, organizations are scrambling to comply with the strict data security standards.

How enterprise security transformed in 2017 and what comes next in 2018

How enterprise security transformed in 2017 and what comes next in 2018

Digital transformation and microservices made up the most impactful trends for the enterprise security industry in 2017, but what will have the biggest impact in 2018?

Managing devops with dynamic authorization

Managing devops with dynamic authorization

Security technologies, like Dynamic Authorization, are an integral part of the devops methodology and should be managed in the same manner as the application itself.

Digital transformation: securing customer-centric initiatives

Digital transformation: securing customer-centric initiatives

Organizations have a focus around improving the customer experience in every aspect of the customer journey. Often called “digital transformation,” this evolution is focused on modernizing tools and processes within an organization.

Enhancing API security: dynamic authorization to protect sensitive data

Enhancing API security: dynamic authorization to protect sensitive data

APIs that handle sensitive data pose security and data access control threats, require advanced security solutions. API Gateways effectively manage the authentication of the user and provide service orchestration capabilities. But if...

Load More