Partner Details

NextLabs®, Inc. is the leading provider of policy-driven information risk management software for large enterprises. Our software automates security controls and compliance procedures across all core business processes to enable safer global collaboration, safeguard information sharing, and prevent wrongful disclosure of sensitive and non-public information.


 Sponsored Events

Date Title
May 09 ‑ May 12, 2017 Congress

European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.

Nov 12, 2015 Webinar

Controlling Access through Centralized Authorization

Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected devices and smart phones brings a new set of challenges beyond these traditional controls requiring the use of authorization as a fundamental component for a complete access and security strategy.

 Reports

Date Title Price
Oct 30, 2015

Executive View: NextLabs Rights Management Platform - 71272

Comprehensive Rights Management solution including information classification, based on a well thought-out policy management model supporting XACML as a standard, with outstanding support…

€190.00

 Videos

Date Language Title
Nov 13, 2015

Controlling Access through Centralized Authorization

Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected devices...