A Systematic Approach to Controlled Technical Data

NextLabs routinely advises customers whose businesses handle Controlled Technical Data (CTD) such as ITAR, EAR, and data controlled by non-US Jurisdictions, to take a proactive, systematic approach to managing CTD throughout its lifecycle. Many of these enterprises have been in business for a number of decades, during which time they have created substantial CTD organically, and acquired additional CTD through various business transactions and transformations. The CTD routinely spans every type of electronic storage that has ever been used in the enterprise. A portion of this CTD, in some cases a substantial portion, has reached Legacy CTD status, which means that it is no longer actively used in the normal business operations of the enterprise. more “A Systematic Approach to Controlled Technical Data”

Protecting Intellectual Property for Product Lifecycle Management (PLM): The Right Way to Do Rights Management

Beyond Cyber-Hacking: The Growing Threats of Internal Theft and Data Mishandling

Designers and manufacturers of high tech products and services, particularly in aerospace and defense, have always spent huge amounts of money to protect intellectual property (IP) from loss and leak. The bulk of security efforts typically focuses on the growing threat of external intrusion from outside the company, particularly from overseas cyber-hackers. This focus is not surprising given the media attention on high profile cyber-hacking incidents, especially the details divulged by the Snowden documents. NSA documents reveal a huge amount of data related to defense technologies being stolen: the equivalent of five Libraries of Congress (50 terabytes). more “Protecting Intellectual Property for Product Lifecycle Management (PLM): The Right Way to Do Rights Management”

CAD Under Siege with Persistent Threats that Require Persistent Protection

by Andy Han, Senior VP of Products & Engineering at  NextLabs and Jason Enzweiler, Senior Product Manager at  Siemens

Increasing intellectual property threats, globalization and collaborative product development have something in common: the need for premium protection of intellectual property.   Intellectual property is estimated to represent 70% of a company’s assets and around 6% of this is stolen each year (reference theregister.co.uk). more “CAD Under Siege with Persistent Threats that Require Persistent Protection”

Challenges to Secure Product Collaboration in PLM Applications

By Sandeep Chopra

Design and engineering organizations consistently describe controlling sensitive product data as a top IT priority. However, trends in product collaboration technologies are creating new risks to securing product data. As PLM applications evolve into more complex ecosystems, design engineering teams are empowered to collaborate in new ways. But as collaboration becomes more fluid, and process more agile, product data is exposed to more risk. more “Challenges to Secure Product Collaboration in PLM Applications”