Skip to main content

The General Data Protection Regulation

May 25, 2017

NextLabs has the end-to-end solution for ensuring GDPR compliance and seamlessly reducing exposure to threats.

Ovum On The Radar Report: NextLabs

May 3, 2017

Ovum has put NextLabs on the radar for enterprise organizations as a solution for gaining control and flexibility over data...

Implementing Data Security with Attribute Based Access Control (ABAC)

January 23, 2017

Attribute Based Access Control(ABAC) provides a robust, data security solution that keeps pace with the demands of your extended enterprise.

The Next Generation in Manufacturing – Are Your Secrets Safe?

November 17, 2016

The Next Generation in Manufacturing – Are Your Secrets Safe? Companies are starting to explore the use of additive manufacturing...

Automatically Protect Critical Data and Documents in SAP

October 20, 2016

Using SAP Dynamic Authorization to create real time contextual access controls, companies and their ecosystems are now more connected than…

Secure Global Collaboration with Information Labeling and Handling

August 25, 2016

The Aerospace and Defense (A&D) industry is a significant target for what has become a common problem – the theft...

Cybersecurity and U.S. Export Controls: DFARs, Cloud Computing, and So Much More!

August 3, 2016

Join NextLabs for its upcoming webinar titled Cybersecurity and U.S. Export Controls: DFARs, Cloud Computing, and So Much More! Organizations...

SAP Information Risk Management

July 26, 2016

Managing Information Risk to Improve Compliance, and Enhance Security As organizations take their business global, they quickly encounter mul-tiple roadblocks to...

NextLabs EDRM for Siemens Teamcenter Demo

July 6, 2016

See how NextLabs Rights Management extends your Teamcenter data security model to persistently protect and control your sensitive data outside...

Cyber Security Solution for SAP Data

July 5, 2016

Not a day passes without the report of another cyber breach. The causes of a cyber breach range from malicious...

Technical Data Export Compliance for SAP GTS

July 5, 2016

With globalization, enterprises face an ever more difficult challenge complying with export regulations such as the US International Traffic in...

Secure Supply Chain Collaboration

July 5, 2016

To maximize competitive advantage and drive down cost, companies are increasingly dependent on an extended supplier and contractor network. To...

Information Rights Management and Document Control

July 5, 2016

Improve visibility and collaboration while ensuring confidentiality of planning and manufacturing data with rights management.  Ease of use, simple administration,...

Information Protection for Corporate Governance

July 5, 2016

Corporate Governance & Confidential Information Protection Solution manages the protection, sharing and communication of board-level information. It persistently protects confidential...

Secure Engineering Collaboration

July 5, 2016

Intellectual property (IP) such as engineering designs, research documents, source code, parts specifications, engineering bill of materials (eBOM), and CAD...

SAP Global Consolidation

July 5, 2016

Today’s companies maintain diverse business relationships inside and outside the enterprise. To remain competitive and meet global customer demands, companies...

Electronic Export Control for SAP

July 5, 2016

Automate compliance with export regulations such as US ITAR, EAR, German BAFA and UK Export Control Act

Electronic Export Control

July 5, 2016

Automate compliance with electronic export regulations such as US ITAR, EAR, German BAFA and UK Export Control Act

Healthcare Data Protection

July 3, 2016

Healthcare information, including patient medical records and health insurance subscriber data, is accessed and used today within a complex ecosystem...

Intellectual Property Protection

July 3, 2016

Intellectual property such as development research, CAD/CAM designs, source code, and strategic business plans are a company’s most important assets....

Information Barriers Management

July 3, 2016

Monitor and actively enforce boundaries between internal organizations to avoid conflicts of interest when data is accessed and disclosed improperly

Basel II Compliance

July 3, 2016

The Basel Capital Accord (Basel II) issued by the Basel Committee on Banking Supervision, creates international standards that banking regulators...

Audit and Compliance

July 3, 2016

Comprehensive visibility into the location, use and distribution of material, nonpublic private, and personally identifiable information in documents to understand...

Active Control for ePHI Access and Handling Protection Module

July 1, 2016

OVERVIEW Patient and health insurance subscriber electronic protected health information (ePHI) is at risk of violating HIPAA regulations and organizational...

NERC and FERC Cyber Security

July 1, 2016

Identify, control and audit the flow of critical cyber assets, to ensure confidentiality and demonstrate NERC and FERC compliance OVERVIEW...

Entitlement Manager for Enovia PLM

June 29, 2016

Organizations rely on their Product Lifecycle Management (PLM) applications to streamline collaboration around product design and engineering data, increasingly in...

NextLabs Entitlement Manager for Microsoft SharePoint

June 29, 2016

Microsoft SharePoint provides a popular platform for sharing business-critical data. Teams enjoy easy, ad-hoc collaboration with rapid SharePoint site creation,...

Enterprise Digital Rights Management (EDRM) for Microsoft SharePoint

June 29, 2016

How can companies continue to leverage the benefits of using Microsoft SharePoint for agile collaboration, but also secure data-on-the-move across...

NextLabs Policy Controller

June 29, 2016

The requirements for controlling sensitive and regulated data are a moving target. Data sensitivity changes, regulations change, and business operations...

NextLabs Communications Control for Microsoft Outlook

June 29, 2016

Communication applications, such as email and instant messaging, are a common channel for data loss. Businesses driven by regulations and...

Entitlement Pack for SAP PLM

June 29, 2016

Organizations rely on their Product Lifecycle Management (PLM) applications to streamline collaboration around product design and engineering data on a...

Control Center

June 29, 2016

Implementing authorization policies consistently across the enterprise is a common compliance objective for most leading organizations. Unfortunately, each application and...

Export Control Adapter

June 29, 2016

Compliance with export regulations such as the International Traffic in Arms Regulation (ITAR), Export Administration Regulation (EAR), BAFA or UK...

Secure Collaboration for SAP Visual Enterprise

June 29, 2016

Companies use SAP Visual Enterprise (VE) to create and share complex visual media for engineering, manufacturing, marketing, and service businesses....

NextLabs Rights Management

June 29, 2016

For companies operating in today’s global and competitive environment, it is no longer an option not to share valuable information....

Entitlement Manager Pack for Easy DMS

June 29, 2016

Compliance with regulations, such as the International Traffic in Arms Regulation (ITAR) or Export Administration Regulation (EAR), and protection of...

NextLabs Rights Management and Network Data Loss Prevention

June 29, 2016

Facing complex data protection challenges due to multiple regulatory, industry, and contractual requirements, large global enterprises are deploying a myriad...

Financial Services

June 29, 2016

INFORMATION RISK MANAGEMENT CHALLENGES Companies in financial services, such as those in insurance and investment services, are under intense scrutiny...

Enterprise Digital Rights Management for Siemens PLM

June 29, 2016

Product design is the company’s most valuable secret, and often needs to be shared internally with a global workforce and...

Is Your Controlled Technical Data Naked? Secure It with Data Centric Security!

June 29, 2016

As businesses expand and acquire new companies, they often need to ensure that they remain compliant with both domestic and...

Entitlement Manager for SAP Business Suite

June 28, 2016

Compliance with regulations such as the International Traffic in Arms Regulation (ITAR), Export Administration Regulation (EAR), or NERC/CIP and protection...

Entitlement Manager for SAP Business Warehouse

June 28, 2016

Organizations rely on SAP Business Warehouse (BW) to consolidate data from SAP applications and other data sources and transform it...

Smart Classifier – Automated Classification for Enterprise Data

June 28, 2016

Companies are increasingly challenged with how to manage data. Companies have terabytes of data in archive that need to be...

Aerospace & Defense

June 26, 2016

Information Compliance & Protection Solutions that Control and Audit Information Flow to Comply with Export Regulations, and Protect Sensitive Data...

Design & Manufacturing

June 25, 2016

Information Risk Management Solutions to Prevent Intellectual Property Loss, Mitigate Conflict of Interest Activity, and Control & Audit Information Flow...

Entitlement Manager for File Servers

June 20, 2016

Ensuring mandatory access control across file servers is extremely difficult in today’s enterprise:  servers are distributed, housed on premise and...

A New Approach to Enterprise Digital Rights Management (EDRM)

June 17, 2016

Enterprise DRM is often referred to as Information Rights Management (IRM). IRM addresses the data protection needs of a different...

Microsoft Dynamic Access Control for IT and Compliance: An Example Use Case

June 17, 2016

Microsoft Server 2012 Dynamic Access Control (DAC) is a new authorization model that greatly simplifies management of access to information...

Managing Information Risk for Microsoft SharePoint

June 17, 2016

Ease of use, simple administration, and powerful collaboration capabilities have driven rapid adoption of Microsoft SharePoint. Companies find that once...

Electronic Export Compliance: NextLabs & SAP

June 17, 2016

The Aerospace and Defense (A&D) industry faces a set of unique information security challenges in order to comply with ITAR...

Addressing Gaps in Your Cyber Security

June 17, 2016

Because the biggest impact of cyber breach is data loss, data protection should be architected into the DNA of your...

Automated Information Handling

June 17, 2016

Today’s companies maintain diverse business relationships inside and outside the enterprise. With increased mobile users and data, portable devices, partners,...

Enterprise Governance, Risk, and Compliance Solution for Information Export Control

June 17, 2016

Export controls, such as the International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and similar regulations, govern the...

Integrated Enterprise Digital Rights Management for SAP

June 15, 2016

Do you have a systematic approach to restrict data access to your business critical SAP data? Successful data protection in...

Enterprise Entitlements Management

June 3, 2016

Centrally audit and manage fine-grained authorization across all file servers, portals, and document management systems in the enterprise to reduce...

Real Time Authorizations for Secure Global Collaboration

May 25, 2016

Globalization is forcing organizations to find more advanced ways to protect their most critical assets – their applications and their...

Protect Against Insider Abuse with Enterprise Digital Rights Management

April 21, 2016

A vast number of data breaches are due to insider activity. Although cyber hackers get most of the attention, a...

How NIST is Approaching ABAC and Why it Works

April 5, 2016

Traditional access control systems typically provide authorization based on user roles or their groups. This method has proven to be...

Enhancing SAP Security to Protect Your Most Critical Asset: Your Data

March 9, 2016

Using SAP Dynamic Authorization to create real time contextual access controls, companies and their ecosystems are now more connected than…

Entitlement Manager for SAP PLM

February 10, 2016

Extend roles with attributes to protect access to critical product data inside SAP PLM.

How to Manage Role Explosion for Secure Collaboration

February 10, 2016

Globalization, the need for global access across an extended enterprise, and industry consolidation are key trends driving data access complexity....

SAP Solutions Overview

February 9, 2016

View this video to see how SAP Dynamic Authorization Management helps organizations protect critical SAP data and applications inside and...

Rights Management

February 1, 2016

Share any file type securely across the extended enterprise with advanced encryption and rights protection.

Entitlement Management

January 20, 2016

NextLabs Entitlement Management enhances access control to critical business applications and data.

NIST ABAC Building Block Fact Sheet

January 15, 2016

Traditionally, granting or revoking access to IT systems or other networked assets requires an administrator to manually enter information into...

SAP Dynamic Authorization – ABAC

December 8, 2015

Data security has become one of the most significant challenges in global businesses. Requirements are driven by a variety of...

Controlling Access through Centralized Authorization

November 12, 2015

With SAP, centralized authorization provides a new mechanism for business users to dynamically control access based on the attributes and...

Prevent Data Breach with Attribute Based Access Control (ABAC)

October 14, 2015

New data breaches are reported every day. The public suffers from breach fatigue.  Executives and IT departments are overwhelmed with...

Implementing Flexible Access Controls: Best Practices from The National Cybersecuritry Center of Excellence

September 30, 2015

Enterprises rely upon strong access control mechanisms to ensure that corporate resources (e.g. applications, networks, systems and data) are not...

The Biggest Gap in Your Cyber Security Solution

September 29, 2015

This white paper describes the most common—and most commonly overlooked—source of cyber breach and the challenges that occur when organizations...

Entitlement Manager for SAP Brochure

September 21, 2015

The only SAP-endorsed add-on to protect sensitive data across your SAP landscape.

Designing Electronic Barriers Around Digital Assets – Information Barriers

September 15, 2015

Block the inappropriate sharing and consumption of electronically stored information.

Data-centric Security for the Extended Enterprise

September 15, 2015

Enable your organization to make the shift to data-centric security.

Enhancing SharePoint Compliance with Attribute Based Policies

September 2, 2015

Companies struggle today to balance the need to secure data in SharePoint while enabling secure collaboration internally and throughout the...

Automating Information Controls to Protect Your Data and Enhance Efficiency

August 27, 2015

Information security and compliance are mandates for global information sharing but are increasingly difficult to enforce due to BYODs, cloud...

Cloud Got You Stumped? Here’s How You Can Migrate Safely

July 29, 2015

Companies are dedicating a lot of resources to cloud migration initiatives but they still struggle with data and application security...

Secure Design Collaboration for the Extended Enterprise: Protect Your IP

July 15, 2015

Global collaboration on sensitive intellectual property with partners, suppliers, vendors and employees  is now a pre-requisite for large corporations. Striking...

Automating Robust Export Controls to Prevent Violations

June 24, 2015

It is becoming more and more difficult to keep abreast of new regulatory requirements related to the protection of technical...

The Benefits of Dynamic Access Control for SAP GRC Customers

June 3, 2015

Historically, access control models have been mostly system or user-centric and unable to contextualise the whole access environment. As a...

Enhance Your Risk Controls in SAP GRC: Move to Real-Time Enforcement

May 20, 2015

As companies grow and expand globally, companies turn to SAP GRC to prevent security risk and violations. Current solutions that...

Secure Collaboration for PLM

May 14, 2015

R&D, design, and engineering organizations consistently describe the control of sensitive product data as a critical priority for their I.T....

Don’t Get Caught Off Guard: Secure Your Data from Cyber Breach

May 13, 2015

With cyber attacks on the rise, companies from all industries are increasing the security of their networks – but what...

Secure Deployment of Microsoft SharePoint Extranet for Enterprises

May 9, 2015

Enterprises use extranets for external collaboration with partners, suppliers, customers, clients, joint-ventures and remote employees. Enterprises collaborating with external users...

Control Center

April 21, 2015

An Information Control Platform allows organizations to automate security controls across systems so they align more precisely with policy requirements.

How to Manage Role Explosion for Secure Collaboration

April 8, 2015

 Globalization, the need for global access across an extended enterprise, and industry consolidation are key trends driving data access complexity....

Are You Compliant with DFARS?

March 25, 2015

On November 18, 2013, the Defense Acquisition Regulatory Council (DARC) issued its final ruling for Defense Federal Acquisition Regulation Supplement...

Automating Rights Management for Mobile, Cloud, and Endpoints

March 18, 2015

As companies transform from monolithic entities to ones that have an extended boundary, the need to collaborate and share sensitive...

Microsoft Dynamic Access Control (DAC) for IT and Compliance White Paper

February 2, 2015

This paper talks about the benefits of DAC especially when access controls are complex, and illustrates a use case for...

Securing Technical Data for Teamcenter Eco-System to Improve Export Compliance

January 27, 2015

Global companies often collaborate with suppliers, foreign subsidiaries and overseas contractors in global product design. Companies in highly regulated industries...

IP Protection Best Practices

January 16, 2015

This paper describes challenges to protecting IP within the supply chain, best practices for managing this risk, and NextLabs solutions.

Information Risk Management for Global Enterprises

December 10, 2014

As businesses globalize, they need  to provide flexible access to their critical SAP data in order to support agile business...

Protecting SAP Data on the Move with Rights Management

November 19, 2014

Enterprise data is typically well-protected while it is managed by the SAP server, but how safe is that same information...

Best Practices for SAP Shared Services Consolidation

November 5, 2014

To reduce cost, streamline operations and improve agility, businesses are consolidating their systems, processes, and providing global shared services. Consolidation...

Protecting Critical Data in Cloud-based Services

October 22, 2014

As companies transform their businesses and operations to leverage cloud-based offerings, a key concern is the lack of data security....

The Rockwell Collins Story: How to leverage global design and stay compliant

October 1, 2014

Businesses are going global to reduce cost and improve competitiveness by tapping into overseas markets and leveraging joint ventures (JV),...

Securing SharePoint Collaboration for Technical Data Export Control

September 10, 2014

Global customers in highly regulated industries, such as those in aerospace and defense, industrial machinery and components, high tech, chemicals,...

Roles, Roles and More Roles: What is right for you?

August 27, 2014

Globalization, the need for global access across an extended enterprise, and industry consolidation are key trends driving data access complexity....

Securing PLM Data: What is in Your Toolbox?

August 13, 2014

Product managers, designers and engineers use Product Lifecycle Management (PLM), CAD and 3D visualization software to not only manage the...

Are You Ready for DFARS?

July 30, 2014

 On November 18, 2013, The Defense Acquisition Regulatory Council (DARC) issued its final ruling for Defense Acquisition Regulations System (DFARS)...

Enabling Sustainable Innovation with Secure Collaboration

July 23, 2014

Market globalization and increasing global competition has increased consumer choice, and enterprises are forced to streamline operations, source globally, and...

Securing SAP Technical Data for Export Compliance

June 25, 2014

SAP customers in highly regulated industries, such as those in aerospace and defense, industrial machinery and components, high tech, chemicals,...

Managing Information Risk for Chemical Companies in Global Consolidation

March 25, 2014

To reduce cost, streamline operations and improve agility, Chemicals companies are consolidating their systems, processes, and providing global shared services....