Skip to main content

About NextLabs

About NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications. Our patented dynamic authorization technology and industry-leading attribute-based policy platform helps enterprises identify and protect data, monitor, and control access to sensitive data and prevent regulatory violations—whether in the cloud or on premise. The software automates enforcement of security controls and compliance policies to enable secure information sharing across the extended enterprise. NextLabs has some of the largest global enterprises as customers and has strategic relationships with industry leaders such as SAP, Siemens, Microsoft, and IBM. NextLabs is privately held and headquartered in San Mateo, California, with offices in Boston, London, Hangzhou, People’s Republic of China, Singapore, and Malaysia.

 

Corporate Background

Learn more

 

Patents

NextLabs holds 45 approved technology patents and owns a growing portfolio of more than 30 pending patents.

1. Enforcing Universal Access Control in an Information Management System (7,877,781)

2. Techniques of Optimizing Policies in an Information Management System (8,150,816)

3. Techniques and System to Deploy Policies Intelligently (7,716,240)

4. Associating Code to a Target Through Code Inspection (8,156,566)

5. Preventing Conflicts of Interest Between Two or More Groups Using Applications (7,877,409)

6. Detecting Behavioral Patterns and Anomalies Using Information Usage Data (7,774,363)

7. Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8,185,548)

8. Analyzing Usage Information of an Information Management System (8,244,745)

9. Detecting Behavioral Patterns and Anomalies Using Activity Profiles (8,321,437)

10. Using Information Usage Data to Detect Behavioral Patterns and Anomalies (8,396,890)

11. Enforcing application and access control policies in an information management system with two or more interactive enforcement points (8,407,345)

12. Enforcing Attribute-Based Access Control across Multiple Information Management Systems (8,464,314)

13. Techniques of Transforming Policies to Enforce Control in an Information Management System (8,544,058)

14. Enforcing Policy-Based Application and Access Control in an Information Management System (8,595,788)

15.  Enforcing and Automating Information Control Using Policies in a Distributed Environment (8,621,549)

16. Enforcing Document Control Using Policies in a Distributed Information Management System (8,627,490)

17. Techniques and System to Optimize Policy Deployment – Inspecting Code and Reducing Code Size Associated to a Target (8,640,191)

18. Technique and system to Improve Policy Performance in an Information Management System (8,661,003)

19. Enforcing Access Control Policies on Servers in an Information Management System (8,677,499)

20. Using Centrally Managed Policy to Analyze and Correlate Policy Activities and Usage Data to Detect Behavioral Patterns and Anomalies in an Distributed Information Management System (8,694,523)

21. Preventing Conflicts of Interests Between Two or More Groups Using Applications with Policy (8,762,412)

22.  Policy-driven Techniques and System to Monitor and Log Access of Information Based on System and User Context (8,832,048)

23. Policy-based Approach to Protect Data Shared Using Encryption and Digital Rights Protection Technique (8,843,734)

24. Technique to Analyze and Correlate Activity Data to Detect Risk and Anomaly (8,849,858)

25. Detecting Behavioral Patterns and Anomalies Using Information Flow and Usage Activity Data (8,862,551)

26. Deploying Policies and Allowing Off-Line Evaluations (8,875,218)

27. Policy Optimization Technique for Inspecting Code and Reducing Code Size Associated to a Target (8,904,478)

28. Enforcing Policy-Based Application and Access Control in an Information Management System (8,959,580)

29. Technique and System to Preventing Conflicts of Interests Between Two or More Groups (8,972,449)

30. Techniques of Transforming Policies to Enforce Control in an Information Management System (8,990,886)

31. Protecting Documents Using Policies and Encryption (9,064,131)

32. Techniques and System to Manage Access of Information Using Policies (9,081,981)

33. Analyzing Usage Information of an Information Management System to determine information policy violation (9,152,774)

34. Inspecting code and reducing code size associated to a target (9,203,868)

35. Techniques of transforming policies to enforce control in an information management system (9,253,216)

36. Preventing conflicts of interests between two or more groups using applications  (9,298,895)

37. Detecting behavioral patterns and anomalies using activity data  (9,311,503)

38. Protecting information using policies and encryption 9,313,182

39. Enforcing universal access control in an information management system 9,384,358

40. Techniques and system for specifying policies using abstractions 9,384,360

41. Deploying policies and allowing off-line policy evaluations 9,384,363

42. Preventing conflicts of interests between two or more groups 9,396,351

43. Enforcing policy-based application and access control in an information management system 9,398,051

44. Analyzing activity data of an information management system 9,407,662

45. Protecting documents using policies and encryption 9,413,771

Award Winning Products

NextLabs and its solutions and products are recognized throughout the industry.