People are at the heart of our innovations
NextLabs has a long-standing tradition of technological excellence and a large portfolio of patents. As a team, we innovate, learn, and improve with our customers and partners. The desire to seek the next big thing will always be burning at NextLabs, lighting the path in pursuit of the next ground breaking technology.
Customers use NextLabs data centric security (DCS) solutions to solve some of their toughest security challenges. Our solutions help customers maintain compliance with changing regulatory requirements, ensure their employees are able to safeguard information sharing with their partners to get the job done right, prevent cyber breaches to control loss of trade secrets and other critical data, and more – all with a consistent and manageable approach.
Quick Links
Breakthrough Technology
NextLabs has a long-standing tradition of technological excellence and a large portfolio of patents – we are always in pursuit of the next breakthrough
ACPL 4GL Policy Language
Dynamic Authorization Policy Engine
Zero Trust Policy Platform
Real Time Data-Centric Security (DCS) Enforcement
Enterprise Digital Rights Management (E-DRM)
Zero Code Application Integrations
How we Create Technology
A timeline of nextlabs’ patents and key product releases
- scroll left to see more of the timeline
- swipe left to see more of the timeline
Our technologies allow us to create...
Attribute Based Access Control (ABAC)
An access control model whereby a subject's authorization to perform a set of operations is determined by evaluating policies based on attributes associated with the subject, object, requested operations, and, in some cases, environment attributes.
Zero Trust
Architecture (ZTA)
A cybersecurity paradigm that moves defenses from static, network-based perimeters to focus on users, assets, and resources - ensuring secure access to resources based on the principle of least privilege, where each access request is verified based on access policy.
Externalized Authorization
An authorization paradigm that separates centralized management of authorization policy from the application and delegates authorization decisions to an external decision point - enabling consistent, scalable, and dynamic authorization without embedding security logic directly into the applications.
Data Protection
as a Service
A cloud service for protecting data assets across cloud and on-premises environments to strengthen cybersecurity, safeguard data sharing, and enhance security for data in use, data in transit, and data at rest.
Secure Data Access
Service Edge
A security framework that converges network connectivity with data security and centralized policy control functions - delivered in a single cloud platform to enable secure data access to applications and data sources anywhere.
Zero Code Policy Enforcement
A no code approach to allow enterprises to enforce access and data security controls with centrally managed policy directly across a diverse set of enterprise systems and business applications out of the box (OOTB).
Data Protection
as a Service
A cloud service for protecting data assets across cloud and on-premises environments to strengthen cybersecurity, safeguard data sharing, and enhance security for data in use, data in transit, and data at rest.
Building a Sustainable Future
To build a sustainable future, it requires a dynamic approach to data security that enables your enterprise to scale with future demands.
NextLabs customers include some of the largest government agencies and Fortune 1000 companies, who have some of the most stringent and complex data security requirements. By utilizing an approach that includes technologies like those described above, it enables them to harness the power of advanced data protection, drive decisions through data-analytics, and foster secure collaboration to ensure their data is not only protected today, but also when future demands roll in.
To learn more about how NextLabs customers are scaling operations, while simplifying security processes and reducing costs, check out our featured customers.
Lead with Ground Breaking Technology
Comprehensive portfolio of 90+ patents in the United States and Europe
- Enforcing and Automating Information Control Using Policies in a Distributed Environment (8621549)
- Enforcing Document Control Using Policies in a Distributed Information Management System (8627490)
- Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic Authorization (9961049)
- Using Dynamic Policy to Enable Secure Sharing of Encrypted Documents Within and Outside an Organization (10523423)
- Technique to apply Dynamic Authorization Policy Across Multiple Application Programs with Requests Submitted Through an HTTP-Based API (10592683)
- Dynamically Granting and Enforcing Rights on a Protected Document (10936739)Â
- Applying an Dynamic Authorization Policy Across Multiple Application Programs with Requests Submitted Through an HTTP-Based APIÂ (11347880)
- Enforcing Application and Access Control Policies Across Multiple Applications (8407345 B2)
- Enforcing Attribute-Based Access Control across Multiple Information Management Systems (8464314)
- Enforcing Policy-Based Application and Access Control in an Information Management System (8595788)
- Enforcing Access Control Policies on Servers in an Information Management System (8677499)
- Techniques of Transforming Policies to Enforce Control in an Information Management System (8544058)
- Multilayer Policy Language Structure (9864752)
- Technique to Analyzing Policies of an Information Management System using Policy Set and Reusable Policy Components (10289858)
- Protecting Documents with Centralized and Discretionary Policies (10387669)
- Protecting Documents with Centralized and Discretionary Policies (11132459)
- Techniques and System to Deploy Policies Intelligently (7716240)
- Associating Code to a Target Through Code Inspection (8156566)
- Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
- Techniques and System to Optimize Policy Deployment – Inspecting Code and Reducing Code Size Associated to a Target (8640191)
- Enforcing Universal Access Control in an Information Management System (7877781)
- Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
- Preventing Conflicts of Interest Between Two or More Groups Using Applications (7877409)
- Technique and system to Improve Policy Performance in an Information Management System (8661003)
- Detecting Behavioral Patterns and Anomalies Using Information Usage Data (7774363)
- Analyzing Usage Information of an Information Management System (8244745)
- Detecting Behavioral Patterns and Anomalies Using Activity Profiles (8321437)
- Using Information Usage Data to Detect Behavioral Patterns and Anomalies (8396890)
- Using Centrally Managed Policy to Analyze and Correlate Policy Activities and Usage Data to Detect Behavioral Patterns and Anomalies in an Distributed Information Management System (8694523)
- Detecting Behavioral Patterns and Anomalies Using Activity Data (9311503)
- Policy-based Approach to Protect Data Shared Using Encryption and Digital Rights Protection Technique (8843734)
- Protecting Documents Using Policies and Encryption (9064131)
- Protecting Information Using Policies and Encryption (9313182)
- Protecting Documents Using Policies and Encryption (9413771)
- Protecting Information Using Policies and Encryption (9558360)
- Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic Authorization (9961049)
- Protecting Information Using Digital Rights Policies and Encryption as Container (10110597)
- Technique to Share Digital Rights Protected Documents in a Web Browser (10303892)
- Technique to Protect Documents Using Policies and Encryption for Sharing (10554635)
- Sharing Encrypted Documents Within and Outside an Organization (10911223)
- Protecting Information Using Policies and Encryption (10873574)
- Protecting Documents Using Policies and Encryption (11057355)
- Protecting Documents Using Policies and Encryption (EP2599027)
- Sharing Encrypted Documents Within and Outside an Organization (EP3497614)