Articles

Search Content(Begin)

What are Export Controls?

Export Controls are laws and regulations that govern the transfer or disclosure of goods, technology, software, services, and funds originating in one country to persons or entities based or having citizenship in another country, even if the regulated items are not crossing an international border.

What are Export Controls? Read More »

What is Zero Trust Data Security?

Zero Trust and Data Centric security can be complementary approaches to security. Zero Trust can help to limit access to sensitive data, while Data Centric security can help to protect the data itself. By combining the two approaches, organizations can create a comprehensive security strategy that provides both network-level and data-level protection, helping to improve their overall security posture.

What is Zero Trust Data Security? Read More »

A Business User’s Guide to XACML

XACML stands for “eXtensible Access Control Markup Language”. It is an XML-based markup language designed specifically for Attribute-Based Access Control (ABAC). The standard defines a declarative fine-grained, attribute-based access control policy language, an architecture, and a processing model describing how to evaluate access requests according to the rules defined in policies.

A Business User’s Guide to XACML Read More »

An Overview on ACPL 4GL

NextLabs’ Active Control Policy Language (ACPL) is a fourth-generation policy language (4GL) based on the XACML standard for access control. It’s the underlying language of NextLabs Control Center, the platform that allows users to express and manage information control policies.

An Overview on ACPL 4GL Read More »

What is Dynamic Authorization?

Dynamic authorization is the core technology behind the NextLabs platform, in which authorization and access rights to an organization’s network, applications, data, and other sensitive assets are granted dynamically in real-time via attribute-based access control (ABAC) policies. A dynamic authorization system with ABAC significantly streamlines the management process, removing the need to individually administer hundreds of thousands of access-control lists and role assignments on a daily basis.

What is Dynamic Authorization? Read More »

The Definitive Guide to Attribute-Based Access Control (ABAC)

Attribute-based access control (ABAC) has emerged as the next-gen technology for secure access to business-critical data. The complexities of today’s IT landscape – think cloud apps, data silos, mobile, IoT, Big Data – has exposed the limitations of role-based access control (RBAC) solutions, leaving organizations vulnerable on the data security front. By many, including Gartner and NIST, ABAC is now being considered as the dominant mechanism for the future.

The Definitive Guide to Attribute-Based Access Control (ABAC) Read More »

Search Content(End)