Protecting Intellectual Property for Product Lifecycle Management (PLM): The Right Way to Do Rights Management

By Roger Wigenstam, VP of Products at NextLabs| Beyond Cyber-Hacking: The Growing Threats of Internal Theft and Data Mishandling Designers and manufacturers of high tech products and services, particularly in aerospace and defense, have always spent huge amounts of money to protect intellectual property (IP) from loss and leak. The bulk of security efforts typically … More Protecting Intellectual Property for Product Lifecycle Management (PLM): The Right Way to Do Rights Management

4 Ways IT must Change to Protect your Business

By E.K. Koh, VP of Solutions at NextLabs It’s not your perimeter. It’s not your applications. In an age where there is no perimeter, where data moves from application to application, from servers to desktops to tablets and smart phones that the company does not even own, managing security at the perimeter or application is … More 4 Ways IT must Change to Protect your Business

My SharePoint Rights Management Wish List

By Yann Lejas, Director of Sales Engineering at NextLabs | Most enterprises are using browser-based applications, such as Microsoft SharePoint, to store and share documents and files with their colleagues, business partners, and customers. This platform presents certain advantages: it makes information easy to share and quick to transfer. Digital documents can be accessed anywhere, … More My SharePoint Rights Management Wish List

Is this the Right time for Rights Management?

By E.K. Koh, VP of Solutions at NextLabs It depends on whether you believe the analysts. In the report “Information Security Predictions and Recommendations 2014”, Kuppinger Cole recommends that enterprises “Focus on strategic elements such as Information Rights Management for documents and Enterprise Key and Certificate Management (EKCM) for managing the secrets.” And, at the … More Is this the Right time for Rights Management?

SharePoint 2014 Key Security Takeaways – Our Top 5

By Mandy Pang, Senior Product Manager SharePoint 2014 Key Security Takeaways – Our Top 5 The conference attendees were buzzed on Attributes.  Specifically, attribute-based security models for SharePoint.  Role-based models are no longer making the cut – they leave collaboration vulnerable.  Attribute-based solutions have fine-grained control. Clouds, of course was big, even bigger was the … More SharePoint 2014 Key Security Takeaways – Our Top 5