Home | Community | Articles

Articles

Explore in-depth about how to simplify compliance and different approaches & technologies to safeguard data

Featured Article

What is Attribute-Based Access Control?

By many, including Gartner and NIST, ABAC is now being considered as the dominant mechanism for the future.  As part of a consortium tasked with creating a reference architecture for ABAC, NextLabs was selected by the National Institute of Standards and Technology (NIST) to help define the core capabilities and benefits of ABAC.

All NextLabs Articles

Federated identity is a system that enables users to access multiple applications, services, or organizations using a single set of …

thumbnail - securing sensitive data in AI models

In the age of data consolidation and AI, safeguarding sensitive data is crucial. Learn how Zero Trust Security forms the …

thumbnail - externalized authorization management

Federated identity is a system that enables users to access multiple applications, services, or organizations using a single set of …

thumbnail - what is policy engine

Federated authorization refers to a system of granting access rights to users across multiple organizations or systems without requiring them …

Article The Importance of a Zero Trust Data-Centric Security Approach when Migrating to SAP S4HANA

As enterprises continue to upgrade their SAP ERP systems to SAP S/4HANA, it is crucial to implement Zero Trust principles …

Real-Time Policy Enforcement in Dynamic Environments

Dynamic authorization is essential for securing modern, distributed IT environments because it provides real-time, adaptive access control that is context-sensitive …

PBAC and ABAC - thumbnail

Many enterprises need to securely protect information and comply with export control regulations. Export controls govern the information that cannot …

what is PBAC - thumbnail

Many enterprises need to securely protect information and comply with export control regulations. Export controls govern the information that cannot …

electronic export compliance - thumbnail

For the A&D industry and beyond, the intricate issues of electronic export compliance of technical data calls for a data-centric …

safeguard data in Joint Venture, M&A, divestitures, and sanctions - thumbnail

Safeguarding data during organizational changes requires dynamic security controls beyond conventional ones in response to drastic changes.

IP protection - thumbnail

To protect intellectual property in a collaborative global supply chain, a data-centric solution with dynamic access management is necessary.

thumbnail - why DSC

Data-centric security (DCS) involves technologies, processes, and policies whose focus is on the location of the data, its collection, storage, …

thumbnail - what is ACPL

NextLabs’ Active Control Policy Language (ACPL) is a fourth generation policy language (4GL) based on the XACML standard for access …

managing role and group explosion with dynamic authorization - thumbnail

Explore why Role-Based Access Control (RBAC) should be enhanced with Attribute-Based Access Control (ABAC) in this globalized and ever-changing world.

dynamic data protection using ABAC - thumbnail

Discover how NextLabs Data Access Enforcer reaches dynamic data protection through enhancing Role-Based Access Control with Attribute-Based Access Control.

how to secure a successful ABAC implementation - thumbnail

To ensure the realization of these benefits, it is essential to establish best practice guidelines for successful ABAC implementation. Discover …

thumbnail - Zero Trust data security

Zero Trust and Data Centric security can be complementary approaches to security. Zero Trust can help to limit access to …

DLP for SAP - thumbnail

Explore how a data loss prevention solution can protect SAP data regardless of where it resides throughout its lifecycle.

thumbnail - guide to ABAC

Attribute-Based Access Control (ABAC) is a security model that secures data dynamically with attribute-driven policies.

thumbnail - dynamic authorization

Dynamic authorization is a technology in which authorization and access rights to an enterprise’s network, applications, data, or other sensitive assets …

thumbnail ACPL

NextLabs’ Active Control Policy Language (ACPL) is a fourth generation policy language (4GL) based on the XACML standard for access …

thumbnail - wat is policy engine

A policy engine is an essential component of Zero-Trust Architecture (ZTA), which has gained popularity in recent years as a …

thumbnail - EDRM

Many enterprises need to securely protect information and comply with export control regulations. Export controls govern the information that cannot …

thumbnail - export control

Many enterprises need to securely protect information and comply with export control regulations.

thumbnail - SoD

Segregation of duties (SoD), also called separation of duties, is a fundamental aspect to sustainable internal controls and risk management.

thumbnail - what are export controls

Export Controls are laws and regulations that govern the transfer or disclosure of goods, technology and funds originating in one …

thumbnail - data segregation

Data segregation is the process of separating certain sets of data from other data sets so that different access policies …

thumbnail - externalized authorization

We live in a dynamic world which requires organizations to be more responsive. Typically, information and application access policies are …

thumbnail - ZTA

As defined by NIST, a zero trust architecture (ZTA) employs a data-centric methodology that focuses on protecting resources over the …

logo NextLabs black no trademark

Welcome to the NextLabs Community 

NextLabs Community Members get unlimited access to the newest white papers, customer stories, etc. on the Community Portal as well as newsletters, product updates, and other exclusive news to your inbox.

Want to Join?

Login or register for a NextLabs ID to unlock the benefits of the Community Portal.