NextLabs included in Gartner research on data-centric security architecture

Gartner recently published Technical Professional Advice on “How to Successfully Design and Implement a Data-Centric Security Architecture” on July 22, 2019. One of their recommendations is that security and risk management technical professionals dealing with application and data security “should adopt a holistic approach to increase the agility, effectiveness and completeness of data security and protection, by using the framework provided in this research.” 

NextLabs provides solutions across all three Control Families (Insight, Confidentiality Protection, and Monitoring and Response), across multiple data silos (e.g., databases, Big Data, Files and SaaS), and across the different data access types (in app, on access, and at rest).

If you’d like to learn more details about how you can mitigate the threats and compliance issues impacting your data, check out the full Gartner report here (if you’re a Gartner subscriber) or shoot us an email at info@nextlabs.com to see how we can help you design a data-centric security architecture appropriate for your environment.

GDPR: A Lens into the Bigger Picture of Digital Transformation

LensThe General Data Protection Regulation (GDPR) has been receiving much press the last couple years on both sides of “the pond” and for good reason.  It impacts companies not just in Europe but potentially anywhere in the world.

We’re doing business in a world that’s increasingly globalized and intertwined, much more so than it’s ever been.  Large multinational companies have offices throughout the globe.  more “GDPR: A Lens into the Bigger Picture of Digital Transformation”

Why Dynamic Authorization Is a Big Deal in Data Security

CollaborationIf you’re unfamiliar with dynamic authorization, be prepared for an epiphany of sorts.  It could very well be the biggest little secret you’ve never heard of with respect to data security.  What with all the cloud apps, mobile devices, Big Data, and productivity tools that consume our professional lives these days, legacy access control solutions are having a difficult time keeping pace. more “Why Dynamic Authorization Is a Big Deal in Data Security”

Changing Face of Data Security

By Sudhindra Kumar, Manager of Software Engineering at NextLabs, Inc.|

With the growing adoption of cloud for various business processes, traditional approaches to data security are no longer sufficient to keep enterprise data safe. Gone are the days when all critical information was protected behind a firewall with access restricted to specific clients/devices. IT security teams are under increased pressure to make data available to a plethora of devices (mobile phones/tablets/personal laptops, etc.) and applications without compromising on the security aspect of the data.

Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and increasing to 20.8 billion by 2020. A large percentage of these devices are going to be BYOD, which carry a combination of personal and business data, and have major vulnerabilities – putting your enterprise data at risk. Attackers have shifted their focus from secure enterprise environments to these vulnerable devices, which give them an easy gateway to your enterprise data. Mobile Device Management has become an important staple for every organization. more “Changing Face of Data Security”

Protecting Critical Data in Cloud-based Services

By Sudhindra Kumar, Principal Software Engineer at NextLabs, Inc.

Cloud has revolutionized the way information is stored and shared. Cloud can increase business efficiency by enhancing collaboration, increasing accessibility, and improving work flexibility. These are driving more and more businesses toward cloud-based services. A recent survey conducted by Dell shows nearly every IT decision-maker said their company either uses or plans to use cloud services. Of those using cloud, 72% of organizations experienced 6% business growth in the past three years. Cloud leads to greater business value and opens new opportunities to the enterprise. more “Protecting Critical Data in Cloud-based Services”

Data Retention and Disposal in the cloud

By Sudhindra Kumar, Principal Software Engineer at NextLabs

In this blog series, we’ve discussed some of the key challenges impeding adoption of the cloud. In this instalment, we’ll talk about Data Retention and Disposal in the cloud. A lot of attention is paid to cloud data protection, regulatory compliance for cloud data, and how to handle data breaches. Of equal importance are the Data Retention and Disposal requirements. Both of them are key components of a good information security strategy. more “Data Retention and Disposal in the cloud”

Data Security in the Cloud – beyond Encryption

by Sudhindra Kumar, Principal Software Engineer at NextLabs

Kentucky recently joined 46 other states in the U.S. that enacted a data breach notification law.  California is the vanguard – enacting the first such law in 2002.  And now, the high profile data breaches of retailers Target and Neiman Marcus are serving as stimulants for revisions to and improvements of the breach notification laws. more “Data Security in the Cloud – beyond Encryption”

Cloud Security – Protecting data at rest and in transit – Information Risk Management for the Cloud

By Sudhindra Kumar, Principal Software Engineer at NextLabs

In my previous blog, we discussed about Data Governance Policies and Regulatory Compliance.

In this post, we’ll see some of the options available to protect data at rest and in transit. A few years ago, protecting data in transit was considered more important than protecting data at rest. However, with the proliferation of Internet and cloud technologies, and the subsequent issues related to data breaches have put the spotlight on protecting data at rest as well. Let us take a look at different solutions for protecting data at rest and in transit: more “Cloud Security – Protecting data at rest and in transit – Information Risk Management for the Cloud”