Many of us use cloud services like Box, Dropbox, Google Drive, and OneDrive to store our files and to share them with colleagues or friends. But, do you sometimes get a little nervous knowing that your files are out in the open, susceptible to evildoers searching for security vulnerabilities so they can pilfer confidential info? more “A Sensible Approach to DRM and File Sharing Services”
The General Data Protection Regulation (GDPR) has been receiving much press the last couple years on both sides of “the pond” and for good reason. It impacts companies not just in Europe but potentially anywhere in the world.
We’re doing business in a world that’s increasingly globalized and intertwined, much more so than it’s ever been. Large multinational companies have offices throughout the globe. more “GDPR: A Lens into the Bigger Picture of Digital Transformation”
If you’re unfamiliar with dynamic authorization, be prepared for an epiphany of sorts. It could very well be the biggest little secret you’ve never heard of with respect to data security. What with all the cloud apps, mobile devices, Big Data, and productivity tools that consume our professional lives these days, legacy access control solutions are having a difficult time keeping pace. more “Why Dynamic Authorization Is a Big Deal in Data Security”
As corporate security, data sharing, and compliance requirements increase, managing access to customer data in Microsoft Dynamics CRM has become more important than ever. These changing requirements can result in increased administration overhead and complexity.
NextLabs Enforcer for Microsoft Dynamics helps simplify this management by extending the existing Dynamics security model through attribute based policies. more “Policy Based Security for Microsoft Dynamics CRM”
In our previous posts (Part 1) (Part 2), we identified three common SharePoint security concerns and how to address them using externalized authorization and attribute based access control. Now that we have ensured the data in SharePoint is secure, how do we extend that security beyond SharePoint?
Users who are authorized to access sensitive data in SharePoint can download that data and share it with anyone outside of SharePoint. The most common way to prevent this data from being shared with unauthorized users is through encryption and digital rights management. more “Addressing Common SharePoint Security Concerns with NextLabs – Part 3”
In a previous post (Part 1), we identified three common SharePoint security concerns and how to address them using externalized authorization and attribute based access control. In this post we will review how we can use NextLabs Entitlement Manager for SharePoint to easily create a policy to address the example use case:
“As an example, a corporate security policy may state that only users located at offices in the United States can access documents in SharePoint with a classification of top secret. To accomplish this in SharePoint today would be a very manual process. more “Addressing Common SharePoint Security Concerns with NextLabs – Part 2”
SharePoint is a great collaboration platform but companies must balance the need to share data with increasing data security, compliance, and privacy concerns. These are some of the common SharePoint concerns we see when working with customers:
Permission management is decentralized
Every company typically uses a combination of either administrators managing permissions to sites or delegation of permission management to site owners. Each site has its own set of permissions to manage (and audit) which becomes even more complex as inheritance is broken. more “Addressing Common SharePoint Security Concerns with NextLabs – Part 1”
What is Cyber Compliance?
In the context of this article, “Cyber Compliance” means ensuring the location, access and transfer of export-regulated data in IT networks and systems complies with export regulations. Cyber Compliance requires companies integrate export control requirements into IT architecture, administration and use.
Cyber Compliance differs from Cyber Security in that an environment may be secure, but not compliant. For example, if secure IT infrastructure is located in another country, housing export-regulated data within could result in an export violation. more “Export Regulations & Cyber Compliance”