Changing Face of Data Security

By Sudhindra Kumar, Manager of Software Engineering at NextLabs, Inc.| With the growing adoption of cloud for various business processes, traditional approaches to data security are no longer sufficient to keep enterprise data safe. Gone are the days when all critical information was protected behind a firewall with access restricted to specific clients/devices. IT security teams … More Changing Face of Data Security

A Systematic Approach to Controlled Technical Data

By Dennis Andrie, Director of Professional Services at NextLabs NextLabs routinely advises customers whose businesses handle Controlled Technical Data (CTD) such as ITAR, EAR, and data controlled by non-US Jurisdictions, to take a proactive, systematic approach to managing CTD throughout its lifecycle. Many of these enterprises have been in business for a number of decades, … More A Systematic Approach to Controlled Technical Data

Providing secure access to information for improved customer service while streamlining IT operations

By Tarun Mehta, NextLabs Solutions Team   “Securing customer data in property and casualty insurance, life & savings, and asset management products is tantamount to protecting a company’s ethos. After all, organizations in this industry gain brand loyalty by promising to give customers’ “peace of mind,” which now includes maintaining the privacy and security of … More Providing secure access to information for improved customer service while streamlining IT operations

Protecting Intellectual Property for Product Lifecycle Management (PLM): The Right Way to Do Rights Management

By Roger Wigenstam, VP of Products at NextLabs| Beyond Cyber-Hacking: The Growing Threats of Internal Theft and Data Mishandling Designers and manufacturers of high tech products and services, particularly in aerospace and defense, have always spent huge amounts of money to protect intellectual property (IP) from loss and leak. The bulk of security efforts typically … More Protecting Intellectual Property for Product Lifecycle Management (PLM): The Right Way to Do Rights Management

The Case for Attribute-Based Policies in eDRM

By Mandy Pang, Senior Product Manager at Nextlabs and Ron Kaplan, Security Strategist at NextLabs In today’s collaborative world, eDRM (Enterprise Digital Rights Management) is proving to be one of the most effective ways to share documents with partners. EDRM is a technology that enables companies to restrict access to documents containing sensitive information, both … More The Case for Attribute-Based Policies in eDRM

Another Challenge of Big Data Analytics: Data Leak and Spill (Part 1)

by Rajesh Rengarethinam Senior Software Engineer Manager at NextLabs | In their recent article on Big Data Management and Trends, Gartner identifies Enterprise Data as one of the key challenges facing organizations. The challenge is consolidating data from disparate sources across the extended enterprise and transforming it into critical business intelligence. “You have many data … More Another Challenge of Big Data Analytics: Data Leak and Spill (Part 1)

Real Time Enforcement for Risk Management

By Anand Kotti,  Senior SAP Engineer, NextLabs As companies grow and expand globally, there is an increasing number of enterprise application users, and with this growth, an ever increasing risk of security breaches and violations. As enterprises are becoming more susceptible to security risks and violations from internal users, businesses are moving towards implementing more … More Real Time Enforcement for Risk Management