Channel Avatar

NextLabs @UC-qTXrIre-2rTOwpwG16UFA@youtube.com

657 subscribers - no pronouns :c

NextLabs®, Inc. provides zero trust data-centric security so


53:09
"Developing and Implementing NIST Cybersecurity Framework 2 0 Community Profiles" Webinar Recording
03:11
CloudAz Policy Enforcement on Applications | NextLabs Unified Zero Trust Policy Platform
04:51
Securing CUI with Digital Rights Management (DRM) | NextLabs Digital Rights Management (DRM)
02:52
NextLabs Zero Trust Data-Centric Security to Protect Data Anywhere and Everywhere
03:03
Secure Business Transactions in SAP Finance Masking Data (FMD) | NextLabs Data Access Enforcer (DAE)
04:23
Restrict Access to Pricing Data in SAP Purchase Order | NextLabs Data Access Enforcer (DAE)
11:48
Securing AI for SAP | NextLabs Cybersecurity Expert Series
04:11
Teamcenter Active Workspace (AWC)​ | NextLabs Digital Rights Management (DRM)
02:51
Restricted Product Search in SAP MDG | NextLabs Data Access Enforcer (DAE)
05:42
Product Data Security SAP MDG | NextLabs Data Access Enforcer (DAE)
03:02
Data Loss Prevention (DLP) in SAP
04:18
Data Protection using Classified Data from SAP GTS​ | NextLabs Data Access Enforcer (DAE)
03:07
Bill of Material (BOM) Data Access Control​ | NextLabs Data Access Enforcer (DAE)
04:12
CloudAz Geolocation Policies | NextLabs Unified Zero Trust Policy Platform
05:39
Separate Policies based on Attributes with CloudAz Policy Segregation
06:58
CloudAz Policy Governance: Manage Folder Permissions | NextLabs Unified Zero Trust Policy Platform
03:34
Export Control Policies for Contractors and Employees | NextLabs Unified Zero Trust Policy Platform
05:23
CloudAz: Location Based Access Control | NextLabs Unified Zero Trust Policy Platform
03:03
Protection of AO Reports in BW System with SkyDRM | Data Loss Prevention in SAP
03:04
Protection of Attachments from Document Info Records with SkyDRM | Data Loss Prevention in SAP
03:25
Protection of Sensitive Attachments with SkyDRM | Data Loss Prevention in SAP
03:25
Data Protection during Download with SkyDRM | Data Loss Prevention in SAP
05:52
CloudAz: Implement Export Control Policies - EAR | NextLabs Unified Zero Trust Policy Platform
06:34
CloudAz: Implement Export Control Policies - ECL | NextLabs Unified Zero Trust Policy Platform
07:17
CloudAz: Implement Export Control Policies - ITAR | NextLabs Unified Zero Trust Policy Platform
53:33
Data Security Challenges and Benefits for Organizations Adopting Open Source Software | Webinar
04:33
CloudAz Audit Logs | NextLabs Unified Zero Trust Policy Platform
04:37
CloudAz Splunk Integration | NextLabs Unified Zero Trust Policy Platform
05:06
CloudAz: Role Validation with Permissions API | NextLabs Unified Zero Trust Policy Platform
08:30
Cybersecurity's Role in Secure Digital Transformation | NextLabs Cybersecurity Expert Series Ep. 17
47:32
Data Mesh Architecture and the Importance of a Data-Centric Security Approach
03:15
How to Automate CMMC Compliance?
09:42
Secure Software Supply Chain | NextLabs Cybersecurity Expert Series Ep. 16
02:59
SkyDRM: Enforce Protection for Creo Files when Offline | NextLabs Digital Rights Management (DRM)
02:41
SkyDRM: Sync Protected Files to OneDrive in the Cloud | NextLabs Digital Rights Management (DRM)
08:44
CloudAz: Policy Orchestration & Policy Deployment | NextLabs Unified Zero Trust Policy Platform
08:08
Ensure Compliance for Global Multinational Enterprises | NextLabs Cybersecurity Expert Series Ep 15
03:19
What is Cybersecurity Maturity Model Certification (CMMC)?
09:05
Open Source Software Security | NextLabs Cybersecurity Expert Series Ep. 14
02:01
CloudAz: Customer Branding | NextLabs Unified Zero Trust Policy Platform
03:26
CloudAz: Policy Studio Dashboard Widget | NextLabs Unified Zero Trust Policy Platform
02:49
CloudAz: Policy Level Permission Expiration | NextLabs Unified Zero Trust Policy Platform
22:56
Data Protection in Motion with Teamcenter Digital Rights Management (DRM)
06:36
Safeguarding Data for Security and Compliance | NextLabs Cybersecurity Expert Series Ep. 13 Part 2
05:44
Safeguarding Data for Security and Compliance | NextLabs Cybersecurity Expert Series Ep. 13 Part 1
03:45
Using Audit and Report to Monitor and Analyze Access Requests | CloudAz Dynamic Attribute Provider
02:59
Using Dynamic Attributes to Control Access for Firefighters | CloudAz Dynamic Attribute Provider
03:09
Control Access to Sensitive Data for Limited Time Period | CloudAz Dynamic Attribute Provider
03:09
Fine-grained Access Control on Region Level | CloudAz Dynamic Attribute Provider
03:14
Real-Time Access Control with Dynamic Attributes from DB & CSV | CloudAz Dynamic Attribute Provider
04:31
Protect Critical Data by Location using Dynamic Attributes | CloudAz Dynamic Attribute Provider
09:45
Enforce Granular Access Controls for Microsoft Teams | NextLabs Application Enforcer
03:15
Improving the Security of Personal & Confidential Data with ABAC: Petrobras' Implementation Story
06:56
Fine-grained Access Control to Office Files & Folders on Desktop | NextLabs Windows Desktop Enforcer
10:09
Data Access Enforcer (DAE) for PostgreSQL DBMS
04:22
CloudAz: Attribute Store Azure AD Enrollment | NextLabs Unified Zero Trust Policy Platform
12:24
Data Access Enforcer (DAE) for Oracle E-Business Suite (EBS)​
09:45
Data Access Enforcer (DAE) for Elasticsearch​
04:56
Safeguard files in SharePoint Online with ABAC based on attributes including Microsoft MIP labels
05:48
CloudAz: Attribute Store LDAP Enrollment | NextLabs Unified Zero Trust Policy Platform