What will data-centric security look like over the next 5 years?

Take a peek at how data-centric security will evolve as we enter a new decade.
Read More

NextLabs and Access Controls of NIST SP 800-53

Learn how NextLabs helps organizations meet the various access control requirements of NIST’s Risk Management Framework.
Read More

The Evolution of RBAC to ABAC

Learn how access control has evolved from roles to attributes and what that means for securing your sensitive data.
Read More

Implementing Data Security with Attribute Based Access Control (ABAC)

Attribute Based Access Control (ABAC) provides a robust, data security solution that keeps pace with the demands of your…
Read More

Secure Global Collaboration with Information Labeling and Handling

The Aerospace and Defense (A&D) industry is a significant target for what has become a common problem…
Read More

A New Approach to Enterprise Digital Rights Management (EDRM)

While enterprise digital rights management (EDRM) has been around for more than a decade, it has yet to reach a tipping…
Read More

Managing Information Risk for Microsoft SharePoint

Ease of use, simple administration, and powerful collaboration capabilities have driven rapid adoption of Microsoft SharePoint. Companies find that once…
Read More

Electronic Export Compliance

The Aerospace and Defense (A&D) industry faces a set of unique information security challenges in order to comply with ITAR…
Read More

Addressing Gaps in Your Cyber Security

Because the biggest impact of cyber breach is data loss, data protection should be architected into the DNA of your…
Read More

Automated Information Handling

To ensure proper information handling and disclosure, aligned with business policies, companies are now moving beyond basic access…
Read More

Enterprise Governance, Risk, and Compliance Solution for Information Export Control

Export controls, such as the International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and similar regulations, govern the…
Read More

SAP Dynamic Authorization – ABAC

Data security has become one of the most significant challenges in global businesses. Requirements are driven by a variety of…
Read More

The Biggest Gap in Your Cyber Security Solution

This white paper describes the most common—and most commonly overlooked—source of cyber breach and the challenges that occur when organizations…
Read More

Designing Electronic Barriers Around Digital Assets – Information Barriers

Perhaps one of the biggest challenges for enterprise companies is anticipating and preparing to block the…
Read More

Data-centric Security for the Extended Enterprise

This white paper outlines FOUR changes organizations must make to achieve data-centric security, and explains…
Read More

Secure Collaboration for PLM

If organizations want to reap the benefits of new collaboration models and PLM technologies, they must first devise new methods…
Read More

Secure Deployment of Microsoft SharePoint Extranet for Enterprises

Enterprises use extranets for external collaboration with partners, suppliers, customers, clients, joint-ventures and remote employees…
Read More

Microsoft Dynamic Access Control (DAC) for IT and Compliance

Microsoft Server 2012 Dynamic Access Control (DAC) is a new authorization model that greatly simplifies management….
Read More

IP Protection Best Practices

The challenges of managing Intellectual Property (IP) are many. The task of protecting engineering data and other IP becomes problematic…”.
Read More