Beyond Cyber-Hacking: The Growing Threats of Internal Theft and Data Mishandling
Designers and manufacturers of high tech products and services, particularly in aerospace and defense, have always spent huge amounts of money to protect intellectual property (IP) from loss and leak. The bulk of security efforts typically focuses on the growing threat of external intrusion from outside the company, particularly from overseas cyber-hackers. This focus is not surprising given the media attention on high profile cyber-hacking incidents, especially the details divulged by the Snowden documents. NSA documents reveal a huge amount of data related to defense technologies being stolen: the equivalent of five Libraries of Congress (50 terabytes). more “Protecting Intellectual Property for Product Lifecycle Management (PLM): The Right Way to Do Rights Management”
In today’s collaborative world, eDRM (Enterprise Digital Rights Management) is proving to be one of the most effective ways to share documents with partners. EDRM is a technology that enables companies to restrict access to documents containing sensitive information, both inside and outside the corporate firewall. The way it works is documents are rights protected using AES encryption and then policies are applied to control access and usage rights (view, edit, print, etc.). If a user is not entitled to view the document, he cannot open it. If he is entitled to view the document, usage may be restricted. more “The Case for Attribute-Based Policies in eDRM”
In their recent article on Big Data Management and Trends, Gartner identifies Enterprise Data as one of the key challenges facing organizations. The challenge is consolidating data from disparate sources across the extended enterprise and transforming it into critical business intelligence.
“You have many data disparate sources – from your enterprise’s ‘dark data’ and partner, employee, customer and supplier data to public, commercial and social media data – that you need to link and exploit to its fullest value.”
more “Another Challenge of Big Data Analytics: Data Leak and Spill (Part 1)”
As companies grow and expand globally, there is an increasing number of enterprise application users, and with this growth, an ever increasing risk of security breaches and violations. As enterprises are becoming more susceptible to security risks and violations from internal users, businesses are moving towards implementing more preventative measures rather than staying in reactive mode.
SAP GRC enables organizations to establish effective internal controls, along with processes to make sure these controls remain consistent, updated and cost-effective to manage. Administrators can now use a single SAP GRC framework to monitor and enforce business, compliance and security policies across the enterprise. SAP has enhanced the GRC offering to include the SAP Dynamic Authorization Management by NextLabs to ensure that companies can quickly adapt to changing policies and streamline enforcement and administration of those policies. more “Real Time Enforcement for Risk Management”
By Sudhindra Kumar, Principal Software Engineer at NextLabs, Inc.
Cloud has revolutionized the way information is stored and shared. Cloud can increase business efficiency by enhancing collaboration, increasing accessibility, and improving work flexibility. These are driving more and more businesses toward cloud-based services. A recent survey conducted by Dell shows nearly every IT decision-maker said their company either uses or plans to use cloud services. Of those using cloud, 72% of organizations experienced 6% business growth in the past three years. Cloud leads to greater business value and opens new opportunities to the enterprise. more “Protecting Critical Data in Cloud-based Services”
By E.K. Koh, VP of Solutions, NextLabs, Inc.
An interview with Luis F. Dannenfels, Senior Principal Architect, Raytheon
NextLabs recently sat down with Luis F. Dannenfels, Senior Principal Architect at Raytheon, to discuss the challenges that A&D companies face in the age of globalization and access anywhere, from any device. Luis talks about the challenges and the solutions. Below is an excerpt of the interview: more “Data Security Challenges for the Global A&D Supply Chain”
By E.K. Koh, VP of Solutions at NextLabs
It’s not your perimeter. It’s not your applications. In an age where there is no perimeter, where data moves from application to application, from servers to desktops to tablets and smart phones that the company does not even own, managing security at the perimeter or application is essential, but not sufficient. What is your value at risk? It is your DATA.
Data is Valuable
In a survey by Forrester, companies noted that corporate secrets (or intellectual property) comprise 2/3 of their information portfolio, with 1/3 being customer custodial data. The figure below shows the relative value of different types of data rated on a million dollar scale: more “4 Ways IT must Change to Protect your Business”
By Yann Lejas, Director of Sales Engineering at NextLabs |
Most enterprises are using browser-based applications, such as Microsoft SharePoint, to store and share documents and files with their colleagues, business partners, and customers. This platform presents certain advantages: it makes information easy to share and quick to transfer. Digital documents can be accessed anywhere, any time and from pretty much any device. more “My SharePoint Rights Management Wish List”