As corporate security, data sharing, and compliance requirements increase, managing access to customer data in Microsoft Dynamics CRM has become more important than ever. These changing requirements can result in increased administration overhead and complexity.
NextLabs Enforcer for Microsoft Dynamics helps simplify this management by extending the existing Dynamics security model through attribute based policies. more “Policy Based Security for Microsoft Dynamics CRM”
In our previous posts (Part 1) (Part 2), we identified three common SharePoint security concerns and how to address them using externalized authorization and attribute based access control. Now that we have ensured the data in SharePoint is secure, how do we extend that security beyond SharePoint?
Users who are authorized to access sensitive data in SharePoint can download that data and share it with anyone outside of SharePoint. The most common way to prevent this data from being shared with unauthorized users is through encryption and digital rights management. more “Addressing Common SharePoint Security Concerns with NextLabs – Part 3”
In a previous post (Part 1), we identified three common SharePoint security concerns and how to address them using externalized authorization and attribute based access control. In this post we will review how we can use NextLabs Entitlement Manager for SharePoint to easily create a policy to address the example use case:
“As an example, a corporate security policy may state that only users located at offices in the United States can access documents in SharePoint with a classification of top secret. To accomplish this in SharePoint today would be a very manual process. more “Addressing Common SharePoint Security Concerns with NextLabs – Part 2”
SharePoint is a great collaboration platform but companies must balance the need to share data with increasing data security, compliance, and privacy concerns. These are some of the common SharePoint concerns we see when working with customers:
Permission management is decentralized
Every company typically uses a combination of either administrators managing permissions to sites or delegation of permission management to site owners. Each site has its own set of permissions to manage (and audit) which becomes even more complex as inheritance is broken. more “Addressing Common SharePoint Security Concerns with NextLabs – Part 1”
What is Cyber Compliance?
In the context of this article, “Cyber Compliance” means ensuring the location, access and transfer of export-regulated data in IT networks and systems complies with export regulations. Cyber Compliance requires companies integrate export control requirements into IT architecture, administration and use.
Cyber Compliance differs from Cyber Security in that an environment may be secure, but not compliant. For example, if secure IT infrastructure is located in another country, housing export-regulated data within could result in an export violation. more “Export Regulations & Cyber Compliance”
NextLabs partners closely with Siemens to help protect Teamcenter PLM data across the extended enterprise. In the age of Industry 4.0, manufacturing has changed — intellectual property is shared with third party manufacturing partners. NextLabs Enterprise Digital Rights Management solution for Siemens Teamcenter provides the protection organizations need to ensure their intellectual property is secure. Guy Bursell, Siemens Teamcenter Product Manager, has shared this article that gives an in-depth look at the challenges and risks companies must consider across their entire engineering and manufacturing ecosystems. more “Guy Bursell Shares About the Challenges of Data in the Extended Enterprise Ecosystem”
A Growing Problem
The theft of Intellectual Property (IP) is estimated to inflict a cost that exceeds $225 billion in counterfeit goods pirated software and the theft of trade secrets, and could be as high as $600 billion annually to the U.S. economy alone. That is according to a 2017 update to The IP Commission Report.1
Co-chair of the bipartisan, independent Commission on the Theft of Intellectual Property (IP Commission) Admiral Dennis C. Blair, former Director of National Intelligence, states that “the massive theft of American IP—from companies and universities across the country, from U.S. labs to defense contractors, from banks to software companies—threatens our nation’s security as well as vitality. This report is just the latest reminder of its scale and critical importance. more “The Need for Rights Management in PLM Todays”
Buzz words always amaze me. I love them if I think I coined them I love them until I think they are old and tired, but no matter what they seem to have a life of their own. Business transformation and Digital business transformation are a very hot topic these days in the enterprise space, but what does Digital Business Transformation really mean:
- Mobile first and cloud-enabled
- Collaboration requirements include always on, with seamless access anywhere and anytime, 24/7
- Digitally connected supply chains for highly responsive or just-in-time production
- Hyper-connected and complex business applications that are iPhone easy to use
- Internet of Things and Big Data driving real-time data decision streams and massive data volumes
more “What is Digital Business Transformation…really?”