Executive View: NextLabs Rights Management Platform - 71272

Report Details

Comprehensive Rights Management solution including information classification, based on a well thought-out policy management model supporting XACML as a standard, with outstanding support for PLM environments and engineeering data.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Oct 30, 2015

Executive View: NextLabs Rights Management Platform - 71272

Comprehensive Rights Management solution including information classification, based on a well thought-out policy management model supporting XACML as a standard, with outstanding support for PLM environments and engineeering data.

€190.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Executive View

Executive View: Deep Secure Content Threat Removal Platform - 79056

The Content Threat Removal Platform by Deep Secure operates at the network boundary, intercepts and analyzes incoming data, extracts only the useful business information while eliminating malicious content and then creates new, clean data for onward delivery. In this way, it defeats…

Executive View

Executive View: Deep Secure Content Threat Removal Platform - 71311

The Content Threat Removal  Platform by Deep Secure provides comprehensive on - the - fly analysis of incoming data, extracting only the useful business information while eliminating malicious content and then reconstructing new clean data for delivery. In this way, it defeats zero -…

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Executive View

Executive View: Boldon James – Data Classification - 72508

Data classification is a requirement of every security framework. More importantly it should be key part of any organization’s control framework, by clearly informing the person (or system) handing the information, whether an employee of the company or an external entity, how that…

Executive View

Executive View: PointSharp Mobile Gateway - 71508

PointSharp Mobile Gateway is an enterprise mobility solution that provides strong authentication and easy, yet secure, mobile access to Microsoft Exchange and Skype for Business, both on-premise and in the cloud.  

Executive View

Executive View: AirWatch Content Locker - 71505

For organizations trying to provide an attractive user experience while protecting corporate information, the continuing rise in popularity of mobile devices, connecting from both inside and outside the corporate network, is a trend that can be frustrating. For organizations with…

Executive View

Executive View: Intralinks VIA® - 71263

Secure lifecycle management of company documents is the goal. Organizations need to be able to manage document permissions and protect them from inappropriate access even when accessed and modified externally. The Intralinks VIA product provides a powerful solution that balances the user…

Leadership Brief

Leadership Brief: Information Rights Management – Ready for Prime Time? - 72013

Information Rights Management (IRM) is the discipline within Information Security and IAM (Identity and Access Management) that allows protecting information right at the source - the single file. IRM is a technology used to protect and facilitate the editing, distribution and access of…

Executive View

Executive View: MobilityLab WorksPad - 71402

WorksPad is an integrated enterprise mobile workplace solution combining secure access to corporate file resources and e-mail with innovative collaboration functions.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Cross-Border Verification with LIGHTest

Cross-Border Verification with LIGHTest

LIGHTest leverages on existing infrastructures to verify electronic transactions. This ability is especially useful for transactions that are not created in the same trust scheme or country as the entity validating the transaction. This is mainly because creating new infrastructure takes time, money and possibly other unforeseen costs. This post shows an example of how to use LIGHTest in practice. Let us assume there are two businesses that are working together for the first time, one from [...]

Latest Insights

Hot Topics

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00