The General Data Protection Regulation (GDPR) has been receiving much press the last couple years on both sides of “the pond” and for good reason. It impacts companies not just in Europe but potentially anywhere in the world. We’re doing business in a world that’s increasingly globalized and intertwined, much more so than it’s ever … More GDPR: A Lens into the Bigger Picture of Digital Transformation
If you’re unfamiliar with dynamic authorization, be prepared for an epiphany of sorts. It could very well be the biggest little secret you’ve never heard of with respect to data security. What with all the cloud apps, mobile devices, Big Data, and productivity tools that consume our professional lives these days, legacy access control solutions … More Why Dynamic Authorization Is a Big Deal in Data Security
By Tarun Mehta, NextLabs Solutions Team “Securing customer data in property and casualty insurance, life & savings, and asset management products is tantamount to protecting a company’s ethos. After all, organizations in this industry gain brand loyalty by promising to give customers’ “peace of mind,” which now includes maintaining the privacy and security of … More Providing secure access to information for improved customer service while streamlining IT operations
By Roger Wigenstam, VP of Products at NextLabs| Beyond Cyber-Hacking: The Growing Threats of Internal Theft and Data Mishandling Designers and manufacturers of high tech products and services, particularly in aerospace and defense, have always spent huge amounts of money to protect intellectual property (IP) from loss and leak. The bulk of security efforts typically … More Protecting Intellectual Property for Product Lifecycle Management (PLM): The Right Way to Do Rights Management
By E.K. Koh, VP of Solutions at NextLabs It’s not your perimeter. It’s not your applications. In an age where there is no perimeter, where data moves from application to application, from servers to desktops to tablets and smart phones that the company does not even own, managing security at the perimeter or application is … More 4 Ways IT must Change to Protect your Business
By E.K. Koh, VP of Solutions at NextLabs It depends on whether you believe the analysts. In the report “Information Security Predictions and Recommendations 2014”, Kuppinger Cole recommends that enterprises “Focus on strategic elements such as Information Rights Management for documents and Enterprise Key and Certificate Management (EKCM) for managing the secrets.” And, at the … More Is this the Right time for Rights Management?
By Sudhindra Kumar, Principal Software Engineer at NextLabs In this blog series, we’ve discussed some of the key challenges impeding adoption of the cloud. In this instalment, we’ll talk about Data Retention and Disposal in the cloud. A lot of attention is paid to cloud data protection, regulatory compliance for cloud data, and how to … More Data Retention and Disposal in the cloud