Home | Innovations

Innovations

Innovation runs in our blood – we move with speed to innovate & deliver great product 

People are at the heart of our innovations

NextLabs has a long-standing tradition of technological excellence and a large portfolio of patents. As a team, we innovate, learn, and improve with our customers and partners. The desire to seek the next big thing will always be burning at NextLabs, lighting the path in pursuit of the next ground breaking technology.

Customers use NextLabs data centric security (DCS) solutions to solve some of their toughest security challenges. Our solutions help customers maintain compliance with changing regulatory requirements, ensure their employees are able to safeguard information sharing with their partners to get the job done right, prevent cyber breaches to control loss of trade secrets and other critical data, and more – all with a consistent and manageable approach.

Quick Links

Breakthrough Technology

NextLabs has a long-standing tradition of technological excellence and a large portfolio of patents – we are always in pursuit of the next breakthrough

ACPL 4GL Policy Language

Dynamic Authorization Policy Engine

Zero Trust Policy Platform

Real Time Data-Centric Security (DCS) Enforcement

Enterprise Digital Rights Management (E-DRM)

Zero Code Application Integrations

How we Create Technology

A timeline of nextlabs’ patents and key product releases

2024
2023
2022
2021
2020
2019
2018
2017
2015
2013
2011
2010
2010
2009
2008
2007
2006
2005

Our technologies allow us to create...

Attribute Based Access Control (ABAC)

An access control model whereby a subject's authorization to perform a set of operations is determined by evaluating policies based on attributes associated with the subject, object, requested operations, and, in some cases, environment attributes.

Zero Trust
Architecture (ZTA)

A cybersecurity paradigm that moves defenses from static, network-based perimeters to focus on users, assets, and resources - ensuring secure access to resources based on the principle of least privilege, where each access request is verified based on access policy.

Externalized Authorization

An authorization paradigm that separates centralized management of authorization policy from the application and delegates authorization decisions to an external decision point - enabling consistent, scalable, and dynamic authorization without embedding security logic directly into the applications.

Data Protection
as a Service

A cloud service for protecting data assets across cloud and on-premises environments to strengthen cybersecurity, safeguard data sharing, and enhance security for data in use, data in transit, and data at rest.

Secure Data Access
Service Edge

A security framework that converges network connectivity with data security and centralized policy control functions - delivered in a single cloud platform to enable secure data access to applications and data sources anywhere.

Zero Code Policy Enforcement

A no code approach to allow enterprises to enforce access and data security controls with centrally managed policy directly across a diverse set of enterprise systems and business applications out of the box (OOTB).

Data Protection
as a Service

A cloud service for protecting data assets across cloud and on-premises environments to strengthen cybersecurity, safeguard data sharing, and enhance security for data in use, data in transit, and data at rest.

Building a Sustainable Future

To build a sustainable future, it requires a dynamic approach to data security that enables your enterprise to scale with future demands.  

NextLabs customers include some of the largest government agencies and Fortune 1000 companies, who have some of the most stringent and complex data security requirements. By utilizing an approach that includes technologies like those described above, it enables them to harness the power of advanced data protection, drive decisions through data-analytics, and foster secure collaboration to ensure their data is not only protected today, but also when future demands roll in.  

To learn more about how NextLabs customers are scaling operations, while simplifying security processes and reducing costs, check out our featured customers.  

Lead with Ground Breaking Technology

Comprehensive portfolio of 90+ patents in the United States and Europe

Dynamic Authorization
  • Enforcing and Automating Information Control Using Policies in a Distributed Environment (8621549)
  • Enforcing Document Control Using Policies in a Distributed Information Management System (8627490)
  • Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic Authorization (9961049)
  • Using Dynamic Policy to Enable Secure Sharing of Encrypted Documents Within and Outside an Organization (10523423)
  • Technique to apply Dynamic Authorization Policy Across Multiple Application Programs with Requests Submitted Through an HTTP-Based API (10592683)
  • Dynamically Granting and Enforcing Rights on a Protected Document (10936739) 
  • Applying an Dynamic Authorization Policy Across Multiple Application Programs with Requests Submitted Through an HTTP-Based API (11347880)
Policy-Based Access Control
  • Enforcing Application and Access Control Policies Across Multiple Applications (8407345 B2)
  • Enforcing Attribute-Based Access Control across Multiple Information Management Systems (8464314)
  • Enforcing Policy-Based Application and Access Control in an Information Management System (8595788)
  • Enforcing Access Control Policies on Servers in an Information Management System (8677499)
Attribute-Based Policy Language
  • Techniques of Transforming Policies to Enforce Control in an Information Management System (8544058)
  • Multilayer Policy Language Structure (9864752)
  • Technique to Analyzing Policies of an Information Management System using Policy Set and Reusable Policy Components (10289858)
  • Protecting Documents with Centralized and Discretionary Policies (10387669)
  • Protecting Documents with Centralized and Discretionary Policies (11132459)
Policy Deployment & Targeting
  • Techniques and System to Deploy Policies Intelligently (7716240)
  • Associating Code to a Target Through Code Inspection (8156566)
  • Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
  • Techniques and System to Optimize Policy Deployment – Inspecting Code and Reducing Code Size Associated to a Target (8640191)
Policy Enforcement & Optimization
  • Enforcing Universal Access Control in an Information Management System (7877781)
  • Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
  • Preventing Conflicts of Interest Between Two or More Groups Using Applications (7877409)
  • Technique and system to Improve Policy Performance in an Information Management System (8661003)
Access Analytics
  • Detecting Behavioral Patterns and Anomalies Using Information Usage Data (7774363)
  • Analyzing Usage Information of an Information Management System (8244745)
  • Detecting Behavioral Patterns and Anomalies Using Activity Profiles (8321437)
  • Using Information Usage Data to Detect Behavioral Patterns and Anomalies (8396890)
  • Using Centrally Managed Policy to Analyze and Correlate Policy Activities and Usage Data to Detect Behavioral Patterns and Anomalies in an Distributed Information Management System (8694523)
  • Detecting Behavioral Patterns and Anomalies Using Activity Data (9311503)
Next Generation Digital Rights Management
  • Policy-based Approach to Protect Data Shared Using Encryption and Digital Rights Protection Technique (8843734)
  • Protecting Documents Using Policies and Encryption (9064131)
  • Protecting Information Using Policies and Encryption (9313182)
  • Protecting Documents Using Policies and Encryption (9413771)
  • Protecting Information Using Policies and Encryption (9558360)
  • Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic Authorization (9961049)
  • Protecting Information Using Digital Rights Policies and Encryption as Container (10110597)
  • Technique to Share Digital Rights Protected Documents in a Web Browser (10303892)
  • Technique to Protect Documents Using Policies and Encryption for Sharing (10554635)
  • Sharing Encrypted Documents Within and Outside an Organization (10911223)
  • Protecting Information Using Policies and Encryption (10873574)
  • Protecting Documents Using Policies and Encryption (11057355)
  • Protecting Documents Using Policies and Encryption (EP2599027)
  • Sharing Encrypted Documents Within and Outside an Organization (EP3497614)

Videos on Patent Areas

NextLabs Resources