NextLabs Expands Data-Centric Security Suite to Combat Cyber Threats

NextLabs, Inc. hasreleased its Data-Centric Security suite for SAP software, which consists of the Integrated Enterprise Digital Rights Management (EDRM) for SAP software and the Entitlement Manager for SAP software. SAP resells NextLabs Entitlement Manager for SAP as the SAP Dynamic Authorization Management application by NextLabs.

NextLabs Data-Centric Security suite for SAP software provides enterprises with a centralized policy-driven solution to secure SAP applications and protect data across the enterprise and in the cloud. Entitlement Manager for SAP secures SAP ERP and SAP Business Suite applications, protects application data and strengthens user authorization to combat cyber threats. EDRM for SAP software protects critical documents and content stored inside and outside of SAP applications.

NextLabs Enterprise Digital Rights Management (EDRM) applies digital rights protection that follows content no matter where it goes. Organizations can share their critical information internally, in the cloud and throughout the extended enterprise, with the proper level of security controls. With EDRM for SAP software, this level of protection is integrated natively with SAP Business Suite applications to help ensure that data extracted or taken out of SAP applications is continually protected. NextLabs EDRM for SAP software delivers support for SAP 3D Visual Enterprise applications and various file types supported by SAP 3D Visual Enterprise, such as 3D PDF, .RH or .VDS files. The product also provides tight integration with services for object and document management service to enable application of digital rights to existing content in an SAP repository and set policies to protect new files as they’re stored in the repository.

NextLabs EDRM offers protection to content produced in Microsoft Office applications as well as virtually all other file formats, including 2D and 3D CAD, PDF, HTML, image files, archives, source code, rich media and more. Files can be classified and rights protected by the user or automatically based on rules or events. Access rights policies are evaluated in real time to determine whether access should be granted upon request. The solution is easy to use and can be accessed via a rich client, mobile app or web browser making it very easy to scale on a global basis.

Comments are closed.