By Tarun Mehta, NextLabs Solutions Team “Securing customer data in property and casualty insurance, life & savings, and asset management products is tantamount to protecting a company’s ethos. After all, organizations in this industry gain brand loyalty by promising to give customers’ “peace of mind,” which now includes maintaining the privacy and security of … More Providing secure access to information for improved customer service while streamlining IT operations
By E.K. Koh, VP of Solutions at NextLabs It’s not your perimeter. It’s not your applications. In an age where there is no perimeter, where data moves from application to application, from servers to desktops to tablets and smart phones that the company does not even own, managing security at the perimeter or application is … More 4 Ways IT must Change to Protect your Business
By E.K. Koh, VP of Solutions at NextLabs It depends on whether you believe the analysts. In the report “Information Security Predictions and Recommendations 2014”, Kuppinger Cole recommends that enterprises “Focus on strategic elements such as Information Rights Management for documents and Enterprise Key and Certificate Management (EKCM) for managing the secrets.” And, at the … More Is this the Right time for Rights Management?
By Sudhindra Kumar, Principal Software Engineer at NextLabs In this blog series, we’ve discussed some of the key challenges impeding adoption of the cloud. In this instalment, we’ll talk about Data Retention and Disposal in the cloud. A lot of attention is paid to cloud data protection, regulatory compliance for cloud data, and how to … More Data Retention and Disposal in the cloud
By E.K. Koh, VP of Solutions at NextLabs | The direct financial costs include future loss of revenue when trade secrets are stolen today. According to the Battelle Foundation report “2013 Global R&D Funding Forecast”, the financial costs of intellectual property theft – internal and external – are compounded over time. When trade secrets are stolen, … More What are the Financial Costs of Data Loss?
By E.K. Koh, VP of Solutions at NextLabs There has been a lot of talk about how data breach is exponentially increasing. In a recent NIST cyber security framework, there is an entire segment on “Protecting” Data. To be effective against cyber-breach, we all agree that implementing all elements of the NIST framework is … More Protecting Against Data Breach – what offers the best bang for your buck?
By Ashwin Bhaskar, Senior Software Engineer at NextLabs In the first part of the blog Series, we discussed the importance of ABAC (Attributes Based Access Control) as a way to augment traditional RBAC (Role Based Access Controls) for field level security. Let us now analyze how we can go about implementing field level security … More SAP Field Level Security – Augmenting Roles with Attributes