What is Cyber Compliance?
In the context of this article, “Cyber Compliance” means ensuring the location, access and transfer of export-regulated data in IT networks and systems complies with export regulations. Cyber Compliance requires companies integrate export control requirements into IT architecture, administration and use.
Cyber Compliance differs from Cyber Security in that an environment may be secure, but not compliant. For example, if secure IT infrastructure is located in another country, housing export-regulated data within could result in an export violation. more “Export Regulations & Cyber Compliance”
NextLabs partners closely with Siemens to help protect Teamcenter PLM data across the extended enterprise. In the age of Industry 4.0, manufacturing has changed — intellectual property is shared with third party manufacturing partners. NextLabs Enterprise Digital Rights Management solution for Siemens Teamcenter provides the protection organizations need to ensure their intellectual property is secure. Guy Bursell, Siemens Teamcenter Product Manager, has shared this article that gives an in-depth look at the challenges and risks companies must consider across their entire engineering and manufacturing ecosystems. more “Guy Bursell Shares About the Challenges of Data in the Extended Enterprise Ecosystem”
A Growing Problem
The theft of Intellectual Property (IP) is estimated to inflict a cost that exceeds $225 billion in counterfeit goods pirated software and the theft of trade secrets, and could be as high as $600 billion annually to the U.S. economy alone. That is according to a 2017 update to The IP Commission Report.1
Co-chair of the bipartisan, independent Commission on the Theft of Intellectual Property (IP Commission) Admiral Dennis C. Blair, former Director of National Intelligence, states that “the massive theft of American IP—from companies and universities across the country, from U.S. labs to defense contractors, from banks to software companies—threatens our nation’s security as well as vitality. This report is just the latest reminder of its scale and critical importance. more “The Need for Rights Management in PLM Todays”
Buzz words always amaze me. I love them if I think I coined them I love them until I think they are old and tired, but no matter what they seem to have a life of their own. Business transformation and Digital business transformation are a very hot topic these days in the enterprise space, but what does Digital Business Transformation really mean:
- Mobile first and cloud-enabled
- Collaboration requirements include always on, with seamless access anywhere and anytime, 24/7
- Digitally connected supply chains for highly responsive or just-in-time production
- Hyper-connected and complex business applications that are iPhone easy to use
- Internet of Things and Big Data driving real-time data decision streams and massive data volumes
more “What is Digital Business Transformation…really?”
We know the problem. Enterprise level Digital Rights Management usually means that I can encrypt something, (usually MSFT Office or PDF), but then when I try to share it with someone who should be able to access it I waste a boatload of time trying to get them access and eventually I just send the data in clear text and tell them not to share it. Uh-oh
EDRM can be a pain or even worse puts me in a position of being out of compliance with internal security policies or even worse . . . governmental regulations. Now to be clear, I have never done anything like this. I am simply giving it as an example of what I have heard from others . . . right? In today’s hyperconnected world I need to be able to share/collaborate securely with people in the extended enterprise, partners, etc. anytime, anywhere and on any device, 24/7. . . is that too much to ask? Oh and by the way, my life is more than just Microsoft Office and PDF documents, I need to share lot’s of different file types . . . you know the drill.
Oh last but not least, I need the EDRM to be automatic, seamless, and deeply integrated with SAP, since that is where most of this work happens for me.
EDRM for SAP
NextLabs is very excited to welcome Mark Clark to the team as the Vice President of EMEA Sales. The significant increase in both internal and external breaches and heightened regulatory requirements have made it essential for companies doing business in the EU to strengthen their data protection policies. Clark has opened NextLabs EMEA headquarters in London to lead the effort to help businesses address their data-centric security challenges.
In his new role, Clark will be working with commercial and government agencies, partners and System Integrators to meet the demands of organizations in the region. As a leader in data protection, NextLabs is committed to helping companies address the increasingly complex regulatory landscape, including the new GDPR mandates, to ensure that they have the necessary data protection in place to securely collaborate throughout their extended enterprise.
According to Chris Johnson, VP, Sales, SAP GRC EMEA, “Security is of the utmost concern to most of our customers, and it is vital to us that we can offer the latest technologies and innovations to answer modern business challenges.” NextLabs is committed to assuring that sensitive information only gets accessed by people with the correct authorization by providing advanced data security solutions to enterprise customers.
For more information, please visit www.nextlabs.com or contact Mark Clark directly at +447739615851.
By Sudhindra Kumar, Manager of Software Engineering at NextLabs, Inc.|
With the growing adoption of cloud for various business processes, traditional approaches to data security are no longer sufficient to keep enterprise data safe. Gone are the days when all critical information was protected behind a firewall with access restricted to specific clients/devices. IT security teams are under increased pressure to make data available to a plethora of devices (mobile phones/tablets/personal laptops, etc.) and applications without compromising on the security aspect of the data.
Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and increasing to 20.8 billion by 2020. A large percentage of these devices are going to be BYOD, which carry a combination of personal and business data, and have major vulnerabilities – putting your enterprise data at risk. Attackers have shifted their focus from secure enterprise environments to these vulnerable devices, which give them an easy gateway to your enterprise data. Mobile Device Management has become an important staple for every organization. more “Changing Face of Data Security”
NextLabs routinely advises customers whose businesses handle Controlled Technical Data (CTD) such as ITAR, EAR, and data controlled by non-US Jurisdictions, to take a proactive, systematic approach to managing CTD throughout its lifecycle. Many of these enterprises have been in business for a number of decades, during which time they have created substantial CTD organically, and acquired additional CTD through various business transactions and transformations. The CTD routinely spans every type of electronic storage that has ever been used in the enterprise. A portion of this CTD, in some cases a substantial portion, has reached Legacy CTD status, which means that it is no longer actively used in the normal business operations of the enterprise. more “A Systematic Approach to Controlled Technical Data”