Blog

Blog2021-04-15T22:33:51+00:00

NextLabs and Zero Trust Architecture (ZTA)

Zero Trust Architecture (ZTA) is a framework focused on data protection. It assumes threats can originate from either inside or outside a network. Instead [...]

By |August 3rd, 2021|Categories: Zero Trust Architecture|Tags: , , , |Comments Off on NextLabs and Zero Trust Architecture (ZTA)

NextLabs releases Data Access Enforcer for SAP 2021

NextLabs releases Data Access Enforcer for SAP 2021 A groundbreaking approach to [...]

By |July 19th, 2021|Categories: DAE for SAP|Tags: , , , , , , |Comments Off on NextLabs releases Data Access Enforcer for SAP 2021

A Solution to Safeguarding Data in Joint Ventures, Divestitures, Mergers and Acquisitions

When changing the organizational and ownership structure of an enterprise, safeguarding [...]

By |July 9th, 2021|Categories: Data Access Security, Entitlement Manager|Tags: , , , , , , , , |Comments Off on A Solution to Safeguarding Data in Joint Ventures, Divestitures, Mergers and Acquisitions

Is Your Company’s Cybersecurity Up to Par?

In 2019, Pew Research Center conducted a study about cybersecurity in which [...]

By |April 28th, 2021|Categories: Uniform Control Model|Tags: , , , , |Comments Off on Is Your Company’s Cybersecurity Up to Par?

3 Important Questions to Ask About Your Data Privacy in SAP

Data privacy is an increasing concern in modern enterprises, especially [...]

By |April 1st, 2021|Categories: Data Privacy|Tags: , , , , |Comments Off on 3 Important Questions to Ask About Your Data Privacy in SAP

Understanding the Challenge of Export Compliance Associating to Controlled Technical Data

Many businesses struggle with understanding the complexity of export control [...]

By |March 24th, 2021|Categories: Export Control|Tags: , |Comments Off on Understanding the Challenge of Export Compliance Associating to Controlled Technical Data
Go to Top