Home | Community | Articles

Articles

Explore in-depth about how to simplify compliance and different approaches & technologies to safeguard data

Featured Article

What is Attribute-Based Access Control?

By many, including Gartner and NIST, ABAC is now being considered as the dominant mechanism for the future.  As part of a consortium tasked with creating a reference architecture for ABAC, NextLabs was selected by the National Institute of Standards and Technology (NIST) to help define the core capabilities and benefits of ABAC.

All NextLabs Articles

Home | Intelligent Enterprise | Data-Centric Security | Why Do You Need Data-Centric Security? Why Do You Need Data-Centric Security? …

Home | Products | CloudAz | What is ACPL What is Active Control Policy Language (ACPL)? NextLabs Blogs NextLabs’ Active …

Home | Intelligent Enterprise| Zero Trust Architecture | Zero Trust Data Security: Explained Zero Trust Data Security: Explained NextLabs Blogs …

Home | Solutions | Regulatory Compliance | The Definitive Guide to Attribute-Based Access Control (ABAC) The Definitive Guide to Attribute-Based …

Home | Solutions | Regulatory Compliance | What is Dynamic Authorization? What is Dynamic Authorization? NextLabs Blogs Dynamic authorization is a …

Home | Products | CloudAz | ACPL Made for Business Users Active Control Policy Language Made for Business Users NextLabs …

Home | Solutions | Regulatory Compliance | What is a Zero Trust Policy Engine? What is a Zero Trust Policy …

Home | Products | SkyDRM | What is Enterprise Digital Rights Management (E-DRM)? What is Enterprise Digital Rights Management (E-DRM)? …

Home | Solutions | Regulatory Compliance | Comply with Export Control Regulations using NextLabs How Companies Can Comply with Export …

Home | Solutions | Regulatory Compliance | What is Segregation of Duties (SoD)? What is Segregation of Duties (SoD)? NextLabs …

Home | Solutions | Regulatory Compliance | What are Export Controls? What are Export Controls? NextLabs Blogs Export Controls are …

Home | Intelligent Enterprise | Data Access Enforcer | What is Data Segregation?  What is Data Segregation? NextLabs Blogs Data …

Home | Intelligent Enterprise | Data-Centric Security | What is Data-Centric Security? What is Externalized Authorization Management? NextLabs Blogs We …

Home | Intelligent Enterprise | Zero Trust Architecture | What is Zero Trust Architecture (ZTA)? What is Zero Trust Architecture …

Welcome to the NextLabs Community 

NextLabs Community Members get unlimited access to the newest white papers, customer stories, etc. on the Community Portal as well as newsletters, product updates, and other exclusive news to your inbox.

Want to Join?

Login or register for a NextLabs ID to unlock the benefits of the Community Portal.