Skip to content
  • Fortra-Logo-TM-SkyBlue
  • File Sharing & DRM Blog
    • Digital Rights Management
    • Secure File Sharing & Compliance
    • Intellectual Property Protection
  • Partners
  • Company
    • About Us
    • Leadership
    • Careers
    • Contact Us
  • Support
  • Contact
  • Search
yH5BAEAAAAALAAAAAABAAEAAAIBRAA7
  • Why Vera?
  • Product
  • Solutions
    • By Industry
      • Manufacturing
      • Media & Entertainment
      • Financial Services
      • Venture Capital & PE
      • Technology
      • Healthcare
    • By Technology
      • DRM
      • Data Classification
      • DLP
      • Secure File Transfer
      • CASB
      • Office365
    • Column 3
  • Customers
  • Resources
  • Pricing
  • Book a Demo
    Book a Demo
Vera  »  Data Privacy & Compliance • Secure Collaboration   »   Taking Trade Secrets Home: Cyber Lessons from a Former Product Engineer
Back to Blog
PrevPrevious
NextNext

Taking Trade Secrets Home: Cyber Lessons from a Former Product Engineer

  • April 11, 2017

Before I joined the security world, I was a lead product engineer for one of the largest consumer product manufacturers in the country. Since manufacturers hold more than 80% of U.S. patents, confidentiality was everything. But here’s the reality: our core designs were never truly secure or confidential. Each new technical employee received carte-blanche access to critical designs and formulations, and these were then shared with multiple third-party suppliers and vendors to execute on the project. While my team was laser-focused on protecting trade secrets, it wasn’t that difficult for a bad actor to take confidential data home or for one of our suppliers to download formulations, forward to a competitor and undo years’ worth of proprietary research.

Luckily, I’m now in a position to help manufacturing security teams solve this problem every single day. And, the solution is simple: by taking a data-centric approach, R&D teams can protect data and IP throughout the entire life cycle — even after it travels across an extended enterprise or moves offline.

Here are the top security concerns I hear from manufacturers and why a data-centric strategy solves them:

1.“I’m worried departing employees will take trade secret information.”

It’s critical for new technical employees to access trade secret designs, formulations, and manufacturing specs to build new technology. But how do you prevent them from taking those trade secrets to a competitor in the future? Most manufacturing security teams focus on protecting the perimeter or the location of where trade secrets reside. But, when an employee takes trade secrets home, no one knows! With data-centric security, these protections can follow your trade secrets throughout their life cycle. Our manufacturing customers especially love the ability to instantly revoke access to information departing employees have downloaded or removed from systems — it’s an effective strategy that immediately eliminates insider threats and leaks.

2.“We have an NDA in place. And classification tags… But that’s not enough.”

External suppliers receive hundreds of trade secrets a day. It’s part of the process — manufacturers must collaborate to execute on their designs. Although an NDA legally protects against known misuse, it’s nearly impossible to prove if highly confidential data was sent to a competitor. With a data-centric strategy, manufacturers can not only secure their designs, they can also audit and track who is looking at their data and from where in the world it’s being accessed. My customers especially love the ability to see and visualize all access points on a map and detect whether competitor domains are trying to open and misuse their trade secrets.

3. “Taking IP from our company would be  as simple as downloading it onto a USB stick. Help.”

Employees store and access business critical IP daily from personal desktops. But how do you keep IP secure if taking it is as simple as downloading it onto a USB stick? Once IP is downloaded, no one knows where it’s going or who is using it. With a data-centric approach, security can follow and restrict competitors from accessing your IP wherever it goes and is stored in the world. Our manufacturing customers love that they can keep control over their most prized information, even if a copy is made and downloaded onto a USB stick.

From the conversations I’ve been having, these security concerns are not unique to any one specific manufacturer. As an engine of innovation, taking a data-centric security approach is by far the best for protecting trade secrets and keeping IP safe — without changing how your team works. I encourage you to think about your current security solutions and take a look at this infographic for more information.

Recent Posts

  • PII Compliance Checklist: How to Protect Private Data January 26, 2023
  • How to Prevent Third-Party Vendor Breaches January 17, 2023
  • How to Prevent Data Loss in 10 Different Ways December 19, 2022
  • The Complete Guide to Brand Protection December 15, 2022
  • Top Benefits of Cloud-Based Access Control November 30, 2022
Back to Blog
PrevPrevious
NextNext

Featured Resources

Intellectual property is the lifeblood of any manufacturing company, but to safeguard the crown jewels, there needs to be a shift in the data security strategy to protect what really matters: the data itself.

Read eBook

In media and entertainment, content is king. To protect that content, you need a security model that puts the data first so that your content remains secure no matter where it goes, how it gets there, or who handles it. At Vera, that’s what we do.

Read eBook

Data is the lifeblood of any technology company, but to safeguard the crown jewels, there needs to be a shift in the data security strategy to protect what really matters: the data itself.

Read eBook

Load More

News

Press

Events

Awards

File Sharing & DRM Blog

Digital Rights Management

Secure File Sharing & Compliance

Intellectual Property Protection

Follow Us

Twitter Linkedin-in Facebook-f Youtube
Copyright © Fortra, LLC and its group of companies. All trademarks and registered trademarks are the property of their respective owners. Terms of Service |  Privacy Policy  |  Cookie Policy  | Contact Us

Before you go, check out these resources

Intellectual property is the lifeblood of any manufacturing company, but to safeguard the crown jewels, there needs to be a shift in the data security strategy to protect what really matters: the data itself.

Read eBook

In media and entertainment, content is king. To protect that content, you need a security model that puts the data first so that your content remains secure no matter where it goes, how it gets there, or who handles it. At Vera, that’s what we do.

Read eBook

Data is the lifeblood of any technology company, but to safeguard the crown jewels, there needs to be a shift in the data security strategy to protect what really matters: the data itself.

Read eBook

Data is a crucial and pervasive asset of any healthcare organization, but to safeguard your most valuable information—as well as that of your patients—there needs to be a shift in the data security…

Read eBook

While Data Loss Prevention (DLP) provides value in certain cases, (such as preventing the loss of data, internally), it does not solve the fundamental problem facing organizations — how to keep data secure in the real world where content moves and is always accessible.

Read Solution Brief

The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. The ability to collaborate freely and securely beyond corporate borders is a must in today’s digital economy. 

Read Solutions Brief

Ever wonder what use cases VERA covers? Now’s your chance. By no means is this an exhaustive list, but we’ve compiled the top 10 most common use cases we see and how you can implement VERA to protect your most sensitive information easily.

Read White Paper

Many organizations have needs for file security and access control that cannot sufficiently be met with “off the shelf” solutions. As a result, they often build their own custom applications to achieve their goals.

Read White Paper

View All Resources

Before you go, check out these resources

Recently, there has been a huge increase in data breaches caused by misconfigured access to and exploited vulnerabilities in cloud storage environments. Cybersecurity companies, like Digital Shadows, DarkMatter, Check Point Software and many others

Read Solutions Brief

The VERA Platform FAQ (Frequently Asked Questions) document contains the most common questions about VERA and reviews the most important aspects of the product. While this is not an exhaustive list of the product’s capabilities,

Read Solutions Brief

Telecommuting is a growing reality for businesses worldwide.  As health concerns disrupt normal life and work patterns, businesses are leaning even more on telecommuting to keep employees productive and work moving forward.

Read White Paper

A global financial services institution with nearly 50,000 employees, “the Company”, faced the challenge of allowing corporate staff to work remotely while ensuring that critical financial data is secure.

Read Case Study

For several years now, we’ve seen an increase in the number of chief executives either resigning or being fired after their company suffered a data breach. In fact, research shows that twice as many CEOs are being fired over

View Infographic

View All Resources