GDPR: A Lens into the Bigger Picture of Digital Transformation

LensThe General Data Protection Regulation (GDPR) has been receiving much press the last couple years on both sides of “the pond” and for good reason.  It impacts companies not just in Europe but potentially anywhere in the world.

We’re doing business in a world that’s increasingly globalized and intertwined, much more so than it’s ever been.  Large multinational companies have offices throughout the globe.  more “GDPR: A Lens into the Bigger Picture of Digital Transformation”

Why Dynamic Authorization Is a Big Deal in Data Security

CollaborationIf you’re unfamiliar with dynamic authorization, be prepared for an epiphany of sorts.  It could very well be the biggest little secret you’ve never heard of with respect to data security.  What with all the cloud apps, mobile devices, Big Data, and productivity tools that consume our professional lives these days, legacy access control solutions are having a difficult time keeping pace. more “Why Dynamic Authorization Is a Big Deal in Data Security”

What is Digital Business Transformation…really?

Buzz words always amaze me. I love them if I think I coined them I love them until I think they are old and tired, but no matter what they seem to have a life of their own. Business transformation and Digital business transformation are a very hot topic these days in the enterprise space, but what does Digital Business Transformation really mean:

  1. Mobile first and cloud-enabled
  2. Collaboration requirements include always on, with seamless access anywhere and anytime, 24/7
  3. Digitally connected supply chains for highly responsive or just-in-time production
  4. Hyper-connected and complex business applications that are iPhone easy to use
  5. Internet of Things and Big Data driving real-time data decision streams and massive data volumes

more “What is Digital Business Transformation…really?”

Enterprise DRM that Actually Works

We know the problem. Enterprise level Digital Rights Management usually means that I can encrypt something, (usually MSFT Office or PDF), but then when I try to share it with someone who should be able to access it I waste a boatload of time trying to get them access and eventually I just send the data in clear text and tell them not to share it. Uh-oh

EDRM can be a pain or even worse puts me in a position of being out of compliance with internal security policies or even worse . . . governmental regulations. Now to be clear, I have never done anything like this. I am simply giving it as an example of what I have heard from others . . . right? In today’s hyperconnected world I need to be able to share/collaborate securely with people in the extended enterprise, partners, etc. anytime, anywhere and on any device, 24/7. . . is that too much to ask? Oh and by the way, my life is more than just Microsoft Office and PDF documents, I need to share lot’s of different file types . . . you know the drill.

Oh last but not least, I need the EDRM to be automatic, seamless, and deeply integrated with SAP, since that is where most of this work happens for me.

EDRM for SAP

A Systematic Approach to Controlled Technical Data

NextLabs routinely advises customers whose businesses handle Controlled Technical Data (CTD) such as ITAR, EAR, and data controlled by non-US Jurisdictions, to take a proactive, systematic approach to managing CTD throughout its lifecycle. Many of these enterprises have been in business for a number of decades, during which time they have created substantial CTD organically, and acquired additional CTD through various business transactions and transformations. The CTD routinely spans every type of electronic storage that has ever been used in the enterprise. A portion of this CTD, in some cases a substantial portion, has reached Legacy CTD status, which means that it is no longer actively used in the normal business operations of the enterprise. more “A Systematic Approach to Controlled Technical Data”

What are the Financial Costs of Data Loss?

By E.K. Koh, VP of Solutions at NextLabs |

The direct financial costs include future loss of revenue when trade secrets are stolen today. According to the Battelle Foundation report “2013 Global R&D Funding Forecast”, the financial costs of intellectual property theft – internal and external – are compounded over time. When trade secrets are stolen, so is the future revenue that would come from licensing and sales of the research and of the products created. more “What are the Financial Costs of Data Loss?”

DFARS: Where is my Unclassified Controlled Technical Data?

By Dennis Andrie, Director of Professional Services and Support at NextLabs

In our last blog post on the Defense Acquisition Regulations System (DFARS) Subpart 204.73 and associated contract clause 252.204-7012, Safeguarding of Unclassified Controlled Technical Information, we discussed actions that companies must act upon to protect Unclassified Controlled Technical Information when they contract or subcontract with the U.S. Government in order to be in compliance with government contracts. more “DFARS: Where is my Unclassified Controlled Technical Data?”

CAD Under Siege with Persistent Threats that Require Persistent Protection

by Andy Han, Senior VP of Products & Engineering at  NextLabs and Jason Enzweiler, Senior Product Manager at  Siemens

Increasing intellectual property threats, globalization and collaborative product development have something in common: the need for premium protection of intellectual property.   Intellectual property is estimated to represent 70% of a company’s assets and around 6% of this is stolen each year (reference theregister.co.uk). more “CAD Under Siege with Persistent Threats that Require Persistent Protection”