NextLabs Entitlement Management allows companies to control access to sensitive data across enterprise applications and collaboration environments. NextLabs’ Entitlement Managers externalize authorization management by integrating directly into enterprise applications to automatically identify, classify, audit, control access and protect sensitive structured and unstructured data to ensure regulatory compliance and protect intellectual property.
Each Entitlement Manager provides four key features to provide the industry’s most comprehensive information-centric entitlement management solution.
Content-aware data identification and classification services automate the process of tagging sensitive structured and unstructured data.
Attribute-Based Access Control (ABAC)
Access to data is based on attributes of users, data and environment to provide support for dynamic access control logic and reduce access management costs.
Integrated Rights Protection
Rights management protection can be automatically applied to sensitive documents to provide end-to-end protection. Works with NextLabs Rights Management and third party rights management from Microsoft and Adobe.
Data access and authorization decisions are captured in a central activity journal with customizable reporting and compliance dashboards.
Pre-Built Policy Enforcement Points
NextLabs Entitlement Management products provide pre-built policy enforcement points (PEPs), called Entitlement Managers, for commercial applications. By providing out-of-the-box integration with the applications already deployed, customers do not need to modify or replace their enterprise applications to take advantage of NextLabs externalized authorization management.
Enterprise Resource Planning (ERP)
Control and protect critical product, planning, production and financial data in ERP, with support for SAP ECC.
Product Lifecycle Management (PLM)
Control and protect critical engineering data in PLM applications from SAP, Siemens, Dassault, and PTC for internal and external engineering collaboration.
Customer Relationship Management (CRM)
Ensure compliance and protect customer intellectual property (IP) by controlling and protecting critical sales and customer data in sales and service applications from SAP.
Supply Chain Management (SCM)
Secure collaboration with supply chain partners by controlling and protecting technical and production data.
Secure internal and external collaboration in SharePoint and File Servers.
Enterprise Content Management (ECM)
Secure sensitive data in document management systems from Documentum and IBM.
Externalize authorization for custom applications with the most complete authorization software development kit (SDK), available in Java, .NET, C++, and Web Services.