White Papers, Articles & Reports
Read our thought leadership pieces covering a variety of topics within the realm of secure information exchange
Read our thought leadership pieces covering a variety of topics within the realm of secure information exchange
White Paper
It is important to have a secure supply chain to protect the INTEGRITY and AVAILABILITY of products and services and ensure they are delivered to the right location within timescales. Alongside the operational aspects is the necessity to protect the CONFIDENTIALITY of data and information. Any security incident that breaches INTEGRITY, AVAILABILITY and/or CONFIDENTIALITY will have damaging impacts to an organisation or business.
Read moreWhite Paper
This paper explores how Secure by Design can be embedded into familiar business governance processes and applied in a variety of situations. Two use cases are used to explore the approach: the delivery of a Secure Information Exchange Solution and the delivery of a High Assurance Secure Information Exchange product.
Read moreWhite Paper
This paper explores the latest research and guidance related to exchange of information between cloud systems, examines how the information risks have changed and assesses how Zero Trust Architectures enable cross domain approaches to evolve. It also looks at the implication of Data Centric Security approaches for security management at a domain boundary.
Read moreWhite Paper
Data Centric Security (DCS) is a paradigm shift in the way we think about data protection and is based around three main tenets; Control, Protect and Share. In this paper we explore the term Data Centric Security, and the benefits and challenges associated with adopting.
Read moreWhite Paper
In the modern world, digitised information is viewed as an asset capable of driving improvements to productivity and efficiency as well as enabling decision making and effective collaboration. This white paper discusses how the nature of secure information exchange requirements is changing, and how suppliers are addressing this change.
Read moreWhite Paper
Interceptor will be Nexor’s latest innovation in the field of secure information exchange. Its novel use of configurable hardware-based validation enforcement promises new levels of flexibility to our customers without compromising on security.
Read moreWhite Paper
In industry, the ability to perform real-time data analysis on Operational Technology (OT) plays a key role in driving business success. However, organisations attempting to make this a reality find that internal data sharing is constrained by the fundamental differences which exist between OT and Information Technology (IT), as well as the priorities of the personnel that use them.
Read moreWhite Paper
The number of Connected and Autonomous Vehicles (CAVs) on the road is expected to increase dramatically over the next decade. Funding and research are being poured into their development to ensure that these vehicles are not only viable, but safe.
Read more