Home | Industry Participation & Recognitions
Industry Participation & Recognitions
Stay ahead with digitization, collaboration, and innovationĀ
[NextLabs Industry Impact] I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo. I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Breakthrough Technology
NextLabs has deep technology portfolio [insert strong subtext]
ACPL 4GL
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Centralized Management
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Enterprise Digital Rights Management
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Policy Engine
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Policy Platform
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Patent Portfolio
- Enforcing and Automating Information Control Using Policies in a Distributed EnvironmentĀ (8621549)
- Enforcing Document Control Using Policies in a Distributed Information Management SystemĀ (8627490)
- Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic AuthorizationĀ (9961049)
- Using Dynamic Policy to Enable Secure Sharing of Encrypted Documents Within and Outside an Organization (10523423)
- Technique to apply Dynamic Authorization Policy Across Multiple Application ProgramsĀ with Requests Submitted Through an HTTP-Based APIĀ (10592683)
- Dynamically Granting and Enforcing Rights on a Protected DocumentĀ (10936739)Ā
- Applying an Dynamic Authorization Policy Across Multiple Application Programs with Requests Submitted Through an HTTP-Based APIĀ (11347880)
- Enforcing Application and Access Control Policies Across Multiple Applications (8407345 B2)
- Enforcing Attribute-Based Access Control across Multiple Information Management Systems (8464314)
- Enforcing Policy-Based Application and Access Control in an Information Management System (8595788)
- Enforcing Access Control Policies on Servers in an Information Management System (8677499)
- Techniques of Transforming Policies to Enforce Control in an Information Management System (8544058)
- Multilayer Policy Language Structure (9864752)
- Technique to Analyzing Policies of an Information Management System using Policy Set and Reusable Policy Components (10289858)
- Protecting Documents with Centralized and Discretionary Policies (10387669)
- Protecting Documents with Centralized and Discretionary Policies (11132459)
- Techniques and System to Deploy Policies Intelligently (7716240)
- Associating Code to a Target Through Code Inspection (8156566)
- Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
- Techniques and System to Optimize Policy Deployment – Inspecting Code and Reducing Code Size Associated to a Target (8640191)
- Enforcing Universal Access Control in an Information Management System (7877781)
- Techniques and System to Optimize and Automatically Deploy Policies for Offline Execution (8185548)
- Preventing Conflicts of Interest Between Two or More Groups Using Applications (7877409)
- Technique and system to Improve Policy Performance in an Information Management System (8661003)
- Detecting Behavioral Patterns and Anomalies Using Information Usage Data (7774363)
- Analyzing Usage Information of an Information Management System (8244745)
- Detecting Behavioral Patterns and Anomalies Using Activity Profiles (8321437)
- Using Information Usage Data to Detect Behavioral Patterns and Anomalies (8396890)
- Using Centrally Managed Policy to Analyze and Correlate Policy Activities and Usage Data to Detect Behavioral Patterns and Anomalies in an Distributed Information Management System (8694523)
- Detecting Behavioral Patterns and Anomalies Using Activity Data (9311503)
- Policy-based Approach to Protect Data Shared Using Encryption and Digital Rights Protection Technique (8843734)
- Protecting Documents Using Policies and Encryption (9064131)
- Protecting Information Using Policies and Encryption (9313182)
- Protecting Documents Using Policies and Encryption (9413771)
- Protecting Information Using Policies and Encryption (9558360)
- Protecting Documents Using Digital Rights Policies and Encryption Using Dynamic Authorization (9961049)
- Protecting Information Using Digital Rights Policies and Encryption as Container (10110597)
- Technique to Share Digital Rights Protected Documents in a Web Browser (10303892)
- Technique to Protect Documents Using Policies and Encryption for Sharing (10554635)
- Sharing Encrypted Documents Within and Outside an Organization (10911223)
- Protecting Information Using Policies and Encryption (10873574)
- Protecting Documents Using Policies and Encryption (11057355)
- Protecting Documents Using Policies and Encryption (EP2599027)
- Sharing Encrypted Documents Within and Outside an Organization (EP3497614)
Featured Recognition
Rec. Title
NextLabs is named Market Leader in Leadership Compass In theĀ Leadership CompassĀ KuppingerCole Report
This report compared CIEM & Dynamic Resource Entitlement & Access Management (DREAM) platforms, NextLabs was named as a market leader.Ā
![](https://wp.nextlabs.us/wp-content/uploads/2023/07/AdobeStock_107030205_Preview.jpeg)
Latest Industry Coverage
![](https://wp.nextlabs.us/wp-content/uploads/2023/01/KuppingerCole_Logo_Privacy_Preference_Center.webp)
Secure Collaboration: Market Compass
In the Secure Collaboration, Market Compass KuppingerCole Report, NextLabs received strong positive security, positive deployment, positive interoperability, strong positive usability, and strong positive market standing ratings.
![](https://wp.nextlabs.us/wp-content/uploads/2023/01/KuppingerCole_Logo_Privacy_Preference_Center.webp)
Secure Collaboration: Market Compass
In the Secure Collaboration, Market Compass KuppingerCole Report, NextLabs received strong positive security, positive deployment, positive interoperability, strong positive usability, and strong positive market standing ratings.
![](https://wp.nextlabs.us/wp-content/uploads/2023/01/KuppingerCole_Logo_Privacy_Preference_Center.webp)
Secure Collaboration: Market Compass
In the Secure Collaboration, Market Compass KuppingerCole Report, NextLabs received strong positive security, positive deployment, positive interoperability, strong positive usability, and strong positive market standing ratings.
Our Industry Participation
![](https://wp.nextlabs.us/wp-content/uploads/2023/09/Recognitions-Industry-Participation-1.png)
As part of our industry participation, we are members of NIST NCCoE’s NCEP Partner Network. The mission of the NCCoE is to collaborate with innovators to provide real-world cybersecurity capabilities that address business needs. An NCEP partnerās investment may take the form of physical infrastructure such as hardware and software components, intellectual knowledge including best practices and lessons learned, or physically or logically colocated personnel who work side by side with federal staff.
We have also contributed to the following works:
Attribute-Based Access Control: NIST SP 800-162
NextLabs was selected by NIST to help define the core capabilities and benefits of Attribute-Based Access Control (ABAC).
Attribute-Based Access Control: NIST SP 1800-3
This paper is a collaborative effort between the NCCoE and technology providers to demonstrate a standards-based approach to ABAC.