A Systematic Approach to Controlled Technical Data

By Dennis Andrie, Director of Professional Services at NextLabs NextLabs routinely advises customers whose businesses handle Controlled Technical Data (CTD) such as ITAR, EAR, and data controlled by non-US Jurisdictions, to take a proactive, systematic approach to managing CTD throughout its lifecycle. Many of these enterprises have been in business for a number of decades, … More A Systematic Approach to Controlled Technical Data

Protecting Intellectual Property for Product Lifecycle Management (PLM): The Right Way to Do Rights Management

By Roger Wigenstam, VP of Products at NextLabs| Beyond Cyber-Hacking: The Growing Threats of Internal Theft and Data Mishandling Designers and manufacturers of high tech products and services, particularly in aerospace and defense, have always spent huge amounts of money to protect intellectual property (IP) from loss and leak. The bulk of security efforts typically … More Protecting Intellectual Property for Product Lifecycle Management (PLM): The Right Way to Do Rights Management

CAD Under Siege with Persistent Threats that Require Persistent Protection

by Andy Han, Senior VP of Products & Engineering at  NextLabs and Jason Enzweiler, Senior Product Manager at  Siemens Increasing intellectual property threats, globalization and collaborative product development have something in common: the need for premium protection of intellectual property.   Intellectual property is estimated to represent 70% of a company’s assets and around 6% of … More CAD Under Siege with Persistent Threats that Require Persistent Protection

Challenges to Secure Product Collaboration in PLM Applications

By Sandeep Chopra — Design and engineering organizations consistently describe controlling sensitive product data as a top IT priority. However, trends in product collaboration technologies are creating new risks to securing product data. As PLM applications evolve into more complex ecosystems, design engineering teams are empowered to collaborate in new ways. But as collaboration becomes more … More Challenges to Secure Product Collaboration in PLM Applications