Home | Community | Articles

Articles

Explore in-depth about how to simplify compliance and different approaches & technologies to safeguard data

Featured Article

What is Attribute-Based Access Control?

By many, including Gartner and NIST, ABAC is now being considered as the dominant mechanism for the future.  As part of a consortium tasked with creating a reference architecture for ABAC, NextLabs was selected by the National Institute of Standards and Technology (NIST) to help define the core capabilities and benefits of ABAC.

All NextLabs Articles

Data-centric security (DCS) involves technologies, processes, and policies whose focus is on the location of the data, its collection, storage, …

NextLabs’ Active Control Policy Language (ACPL) is a fourth generation policy language (4GL) based on the XACML standard for access …

Zero Trust and Data Centric security can be complementary approaches to security. Zero Trust can help to limit access to …

NextLabs' Attribute-Based Access Control (ABAC) is a dynamic authorization technology that keeps data secure despite organizational changes.

Dynamic authorization is a technology in which authorization and access rights to an enterprise’s network, applications, data, or other sensitive assets …

NextLabs’ Active Control Policy Language (ACPL) is a fourth generation policy language (4GL) based on the XACML standard for access …

A policy engine is an essential component of Zero-Trust Architecture (ZTA), which has gained popularity in recent years as a …

Many enterprises need to securely protect information and comply with export control regulations. Export controls govern the information that cannot …

Many enterprises need to securely protect information and comply with export control regulations.

Segregation of duties (SoD), also called separation of duties, is a fundamental aspect to sustainable internal controls and risk management.

Export Controls are laws and regulations that govern the transfer or disclosure of goods, technology and funds originating in one …

Data segregation is the process of separating certain sets of data from other data sets so that different access policies …

We live in a dynamic world which requires organizations to be more responsive. Typically, information and application access policies are …

A traditional security model implicitly trusts everything inside an organization’s network, leaving plenty of loopholes for human error and insider …

Welcome to the NextLabs Community 

NextLabs Community Members get unlimited access to the newest white papers, customer stories, etc. on the Community Portal as well as newsletters, product updates, and other exclusive news to your inbox.

Want to Join?

Login or register for a NextLabs ID to unlock the benefits of the Community Portal.