Featured Article
What is Attribute-Based Access Control?
By many, including Gartner and NIST, ABAC is now being considered as the dominant mechanism for the future. As part of a consortium tasked with creating a reference architecture for ABAC, NextLabs was selected by the National Institute of Standards and Technology (NIST) to help define the core capabilities and benefits of ABAC.
All NextLabs Articles
Data-centric security (DCS) involves technologies, processes, and policies whose focus is on the location of the data, its collection, storage, …
NextLabs’ Active Control Policy Language (ACPL) is a fourth generation policy language (4GL) based on the XACML standard for access …
Zero Trust and Data Centric security can be complementary approaches to security. Zero Trust can help to limit access to …
NextLabs' Attribute-Based Access Control (ABAC) is a dynamic authorization technology that keeps data secure despite organizational changes.
Dynamic authorization is a technology in which authorization and access rights to an enterprise’s network, applications, data, or other sensitive assets …
NextLabs’ Active Control Policy Language (ACPL) is a fourth generation policy language (4GL) based on the XACML standard for access …
A policy engine is an essential component of Zero-Trust Architecture (ZTA), which has gained popularity in recent years as a …
Many enterprises need to securely protect information and comply with export control regulations. Export controls govern the information that cannot …
Many enterprises need to securely protect information and comply with export control regulations.
Segregation of duties (SoD), also called separation of duties, is a fundamental aspect to sustainable internal controls and risk management.
Export Controls are laws and regulations that govern the transfer or disclosure of goods, technology and funds originating in one …
Data segregation is the process of separating certain sets of data from other data sets so that different access policies …
We live in a dynamic world which requires organizations to be more responsive. Typically, information and application access policies are …
A traditional security model implicitly trusts everything inside an organization’s network, leaving plenty of loopholes for human error and insider …