Home | Industry Participation & Recognitions

Industry Participation & Recognitions

Stay ahead with digitization, collaboration, and innovationĀ 

[NextLabs Industry Impact] I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Breakthrough Technology

NextLabs has deep technology portfolio [insert strong subtext]

ACPL 4GL

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Centralized Management

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Enterprise Digital Rights Management

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Policy Engine

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Policy Platform

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Patent Portfolio

Dynamic Authorization

  • Enforcing and Automating Information Control Using Policies in a Distributed EnvironmentĀ (8621549)
  • Enforcing Document Control Using Policies in a Distributed Information Management SystemĀ (8627490)
  • Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic AuthorizationĀ (9961049)
  • Using Dynamic Policy to Enable Secure Sharing of Encrypted Documents Within and Outside an Organization (10523423)
  • Technique to apply Dynamic Authorization Policy Across Multiple Application ProgramsĀ with Requests Submitted Through an HTTP-Based APIĀ (10592683)
  • Dynamically Granting and Enforcing Rights on a Protected DocumentĀ (10936739)Ā 
  • Applying an Dynamic Authorization Policy Across Multiple Application Programs with Requests Submitted Through an HTTP-Based APIĀ (11347880)

Attribute-Based Access Control

  • Enforcing Application and Access Control Policies Across Multiple Applications (8407345 B2)
  • Enforcing Attribute-Based Access Control across Multiple Information Management Systems (8464314)
  • Enforcing Policy-Based Application and Access Control in an Information Management System (8595788)
  • Enforcing Access Control Policies on Servers in an Information Management System (8677499)

Attribute-Based Policy Language

  • Techniques of Transforming Policies to Enforce Control in an Information Management System (8544058)
  • Multilayer Policy Language Structure (9864752)
  • Technique to Analyzing Policies of an Information Management System using Policy Set and Reusable Policy Components (10289858)
  • Protecting Documents with Centralized and Discretionary Policies (10387669)
  • Protecting Documents with Centralized and Discretionary Policies (11132459)

Policy Deployment & Targeting

  • Techniques and System to Deploy Policies Intelligently (7716240)
  • Associating Code to a Target Through Code Inspection (8156566)
  • Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
  • Techniques and System to Optimize Policy Deployment – Inspecting Code and Reducing Code Size Associated to a Target (8640191)

Policy Enforcement & Optimization

  • Enforcing Universal Access Control in an Information Management System (7877781)
  • Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
  • Preventing Conflicts of Interest Between Two or More Groups Using Applications (7877409)
  • Technique and system to Improve Policy Performance in an Information Management System (8661003)

Access Analytics

  • Detecting Behavioral Patterns and Anomalies Using Information Usage Data (7774363)
  • Analyzing Usage Information of an Information Management System (8244745)
  • Detecting Behavioral Patterns and Anomalies Using Activity Profiles (8321437)
  • Using Information Usage Data to Detect Behavioral Patterns and Anomalies (8396890)
  • Using Centrally Managed Policy to Analyze and Correlate Policy Activities and Usage Data to Detect Behavioral Patterns and Anomalies in an Distributed Information Management System (8694523)
  • Detecting Behavioral Patterns and Anomalies Using Activity Data (9311503)

Next Generation Digital Rights Management

  • Policy-based Approach to Protect Data Shared Using Encryption and Digital Rights Protection Technique (8843734)
  • Protecting Documents Using Policies and Encryption (9064131)
  • Protecting Information Using Policies and Encryption (9313182)
  • Protecting Documents Using Policies and Encryption (9413771)
  • Protecting Information Using Policies and Encryption (9558360)
  • Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic Authorization (9961049)
  • Protecting Information Using Digital Rights Policies and Encryption as Container (10110597)
  • Technique to Share Digital Rights Protected Documents in a Web Browser (10303892)
  • Technique to Protect Documents Using Policies and Encryption for Sharing (10554635)
  • Sharing Encrypted Documents Within and Outside an Organization (10911223)
  • Protecting Information Using Policies and Encryption (10873574)
  • Protecting Documents Using Policies and Encryption (11057355)
  • Protecting Documents Using Policies and Encryption (EP2599027)
  • Sharing Encrypted Documents Within and Outside an Organization (EP3497614)

Featured Recognition

Rec. Title

NextLabs is named Market Leader in Leadership Compass In theĀ Leadership CompassĀ KuppingerCole Report

This report compared CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms, NextLabs was named as a market leader.Ā 

Latest Industry Coverage

Secure Collaboration: Market Compass

In the Secure Collaboration, Market Compass KuppingerCole Report, NextLabs received strong positive security, positive deployment, positive interoperability, strong positive usability, and strong positive market standing ratings.

Secure Collaboration: Market Compass

In the Secure Collaboration, Market Compass KuppingerCole Report, NextLabs received strong positive security, positive deployment, positive interoperability, strong positive usability, and strong positive market standing ratings.

Secure Collaboration: Market Compass

In the Secure Collaboration, Market Compass KuppingerCole Report, NextLabs received strong positive security, positive deployment, positive interoperability, strong positive usability, and strong positive market standing ratings.

Our Industry Participation

As part of our industry participation, we are members of NIST NCCoE’s NCEP Partner Network. The mission of the NCCoE is to collaborate with innovators to provide real-world cybersecurity capabilities that address business needs. An NCEP partnerā€™s investment may take the form of physical infrastructure such as hardware and software components, intellectual knowledge including best practices and lessons learned, or physically or logically colocated personnel who work side by side with federal staff.

We have also contributed to the following works:

Attribute-Based Access Control: NIST SP 800-162

NextLabs was selected by NIST to help define the core capabilities and benefits of Attribute-Based Access Control (ABAC).

Attribute-Based Access Control: NIST SP 1800-3

This paper is a collaborative effort between the NCCoE and technology providers to demonstrate a standards-based approach to ABAC.