My SharePoint Rights Management Wish List

By Yann Lejas, Director of Sales Engineering at NextLabs | Most enterprises are using browser-based applications, such as Microsoft SharePoint, to store and share documents and files with their colleagues, business partners, and customers. This platform presents certain advantages: it makes information easy to share and quick to transfer. Digital documents can be accessed anywhere, … More My SharePoint Rights Management Wish List

Data Segregation: Missing piece in securing Enterprise Content

By Soujanya Madhurapantula, Senior Product Manager at NextLabs I have had the same conversation with a lot of our customers… it keeps me awake at night. Here is how many customers have described it to me: We have millions of documents sitting in our enterprise application servers that we know are accessible to all our … More Data Segregation: Missing piece in securing Enterprise Content

SAP Field Level Security – what are my options?

By Ashwin Bhaskar, Senior Software Engineer at NextLabs   Today’s ERP systems demand tight security controls at multiple levels of the application design. Most ERP systems, including SAP, are transactional in nature. Our customers have frequently asked us about extending security controls beyond transactions at a field level. For example, take a digital product catalog … More SAP Field Level Security – what are my options?

SharePoint 2014 Key Security Takeaways – Our Top 5

By Mandy Pang, Senior Product Manager SharePoint 2014 Key Security Takeaways – Our Top 5 The conference attendees were buzzed on Attributes.  Specifically, attribute-based security models for SharePoint.  Role-based models are no longer making the cut – they leave collaboration vulnerable.  Attribute-based solutions have fine-grained control. Clouds, of course was big, even bigger was the … More SharePoint 2014 Key Security Takeaways – Our Top 5

Do you have SharePoint Site Explosion?

By Mandy Pang Microsoft SharePoint server is an outstanding and widely adopted collaboration platform for sharing business-critical data. However, enterprises are finding that SharePoint’s permissions-based security model is not scalable and doesn’t provide adequate controls for sensitive, regulated, and highly valuable data. There is a rapid proliferation of SharePoint sites and data, as well as … More Do you have SharePoint Site Explosion?

Can we turn off Snowden’s access after the fact?

By E.K. Koh In my last blog, Would data-level controls have stopped Snowden, I highlighted the importance to separate system rights from data rights. But what if Snowden was using a login credential that in fact grants him rights to sensitive data? Accounts vary, but in the blog What the Snowden affair taught us , … More Can we turn off Snowden’s access after the fact?

Would data level controls have stopped Snowden?

By E.K. Koh The blog What the Snowden affair taught us questioned, “Why should a system administrator be allowed to download and move files? Shouldn’t system privilege and data privilege be separate?” Ideally “yes”, but in practice, that has not been the case. Most system administrators have unfettered access to data given their system privilege. … More Would data level controls have stopped Snowden?