Skip to main content


What Customers & Partners Say

See What Analysts Say



“The BAE Systems and NextLabs team is using information technology in new and innovative ways, which allows us to be more agile as a business and provide better service to our customers.”

View Case Study

SAP - V2


“NextLabs solutions now offered by SAP as solution extensions will complement SAP solutions for GRC and SAP GTS, allowing SAP customers to more flexibly, rapidly and cost-effectively secure their mission-critical information assets.”



“We looked at a number of IP protection solutions NextLabs was the only one that was flexible and broad enough to protect the data in our field service application from the server down to the client on mobile devices.”

View Case Study



NextLabs solution with Attribute Based Access Control enabled us to provide authorization at a very granular level to prevent contamination and unauthorized access.”

View Case Study



“We needed a solution that could protect our critical data and still enable us to collaborate internally and externally without a high degree of risk.”



“NextLabs allowed us to consolidate our SAP instances into one global instance and enforce security at the data level with dynamic authorization management.”

Siemens - V2
“Customers need to collaborate globally on all aspects of the product development lifecycle.”
SAP - V2
“NextLabs data-centric security software suite helps our customers control user authorization and protect data inside and outside of their enterprise applications, and continues to protect data when it is shared with their partners and customers.”
“We chose NextLabs because their products improved efficiency of our operations, at a lower cost, and enabled us to accelerate production.”

“We couldn’t roll out Microsoft SharePoint until we had NextLabs solution to comply with ITAR and EAR.”

View Case Study

Rockwell Collins
“NextLabs’ policy-based authorization platform allowed us to centralize controls and consistently enforce them globally, across multiple instances of the PLM application – helping us to safeguard information sharing and increase collaboration.”

View Case Study

Siemens - V2
“By working with NextLabs in our core products and using the extension provided in JT2Go, the JT community can realize rights management of 3D JT data throughout their extended enterprise.”

What Analysts Say

Banner Handshake - 2


EDRM technologies promise protection from intellectual property loss, and from inappropriate or unintended disclosure of proprietary or confidential enterprise information, and they allow organizations to strongly audit access to specific data.

Hype Cycle for Data Security 2016, July 13, 2016, Gartner

NextLabs provides an interesting offering for protecting information across the entire lifecycle that should be included when evaluating solutions for setting up a secure information sharing infrastructure within organizations.

Executive View on NextLabs Secure Information Sharing 2015, KuppingerCole

S&R pros have talked about the need to shift focus from the perimeter and device-specific controls to a data-centric approach that focuses on securing the apps and data and controlling access, but for years, it’s been more talk than action. This shift is under way because business and S&R leaders: understand the enormous financial cost and brand damage of data breaches, worry about insider threats, want to achieve compliance and protect privacy without affecting business outcomes, are steaming ahead with cloud, mobile, and other disruptive technologies.

Tech Radar Data Security Q1 2016, Forrester

Business Impact: EAM is a long-term investment in an architecture for granular control of application and data access. Its use in business applications and data systems can significantly change the flexibility and granularity of authorization, resulting in better access control, audit and compliance results over a broader set of applications and data.

Hype Cycle for GRC, July 10, 2015 , Gartner