Skip to main content

Control Center

Automate and manage policies effortlessly

NextLabs Control Center provides a centralized dynamic authorization platform to enforce security policies consistently across the enterprise and beyond. The automation of information controls enables you to better align policies with business requirements and quickly and easily change policies to reflect new situations. Control Center, which is a standards-based dynamic authorization platform, powers our advanced entitlement management and rights management capabilities. This powerful platform integrates and automates data classification, access control, rights management, and audit capabilities. Centrally managed rules and policies describe the part of an application a user can access, the business transactions a user can execute, the data a user is able to access, and what the user can do with that data. Policy changes can be made without modifying the application and automatically enforced at run time.


Automated Security Policy Management

Authorization policies enforced by NextLabs are dynamically evaluated at run time and based on user attributes (such as citizenship, security clearance, department, and roles), resource attributes (such as data classifications, content, and transaction details), and environment attributes (such as time of day, location, authentication scheme, and device type). Administrators do not need to maintain and keep track of role and permission assignments as users move between departments, projects, or locations; their security clearance level changes; or when documents are reclassified. NextLabs is automatically aware of these changes and ensures that access is restricted based on the current environment.

The Control Center includes a central audit repository and central monitoring and reporting solution that provides visibility into user activity across protected applications, systems, and data assets. This centralized visibility helps organizations meet security and regulatory compliance requirements. Rules can be defined to automatically detect and alert administrators of suspicious activity and anomalies in access patterns.


Centralized Policy

All data and application access policies can be created and managed in one platform. This provides central visibility and control on who can do what with the data and under what circumstances across all applications.

Policy Evaluation

Policies are evaluated in real-time using the latest information on user, data, and environment for granting authorization. This eliminates the need for manual administrative changes as a result of a change in status or data reclassification.

Enterprise Scalability

Control Center performs and scales to meet complex authorization requirements of mission-critical applications across the enterprise.

Simple Policy Authoring

Policies can be authored using pre-defined components and conditions. Business users can author policies without help from IT.

In the Cloud

Control Center is available for on-premises deployments and also for cloud and hybrid deployments through CloudAz, the industry’s first cloud authorization service providing dynamic authorization and attribute-based access control in the cloud.

Activity Monitoring
& Reporting

User activity and data access is tracked and stored in a central audit repository. Dashboards, reports, and automated monitoring facilities provide insights into user behavior.

Integrated Security & Compliance

Control Center integrates key features, such as data classification, enhanced access control, and rights management, to consistently enforce security policies across the extended enterprise. It automates the enforcement of regulatory and audit requirements and provides a central audit repository.

Attribute-Based Access Control

Attribute-Based Access Control (ABAC) enables fine-grained authorization using attributes to provide contextual information at the time of access. This enables more informed decisions.

Externalized Authorization

Authorization policy is centrally managed outside of the application, allowing organizations to modify policies without having to make code changes to the application.