4 Ways IT must Change to Protect your Business

By E.K. Koh, VP of Solutions at NextLabs It’s not your perimeter. It’s not your applications. In an age where there is no perimeter, where data moves from application to application, from servers to desktops to tablets and smart phones that the company does not even own, managing security at the perimeter or application is … More 4 Ways IT must Change to Protect your Business

SAP Field Level Security – what are my options?

By Ashwin Bhaskar, Senior Software Engineer at NextLabs   Today’s ERP systems demand tight security controls at multiple levels of the application design. Most ERP systems, including SAP, are transactional in nature. Our customers have frequently asked us about extending security controls beyond transactions at a field level. For example, take a digital product catalog … More SAP Field Level Security – what are my options?

DAC in 2 Minutes

By Sandeep Chopra. In my last two posts on Dynamic Access Control (DAC), I described some of the limitations of traditional approaches to Authorization Management (see here) and how dynamic authorization is different (see here). It’s all about choosing the right tool for the job. This 2-minute use case from Andy Han provides a quick … More DAC in 2 Minutes

Industry Spotlight: How does GE Oil & Gas manage operational Information Risk?

By EK Koh. Many companies need to protect sensitive intellectual property (IP) as they collaborate globally on product designs and across multi-level supply chains. They also need to comply with cross-border export regulations even as they collaborate and share technical data with global customers, partners and employees.