Intellectual property is a valuable asset in a variety of verticals. Let’s take manufacturing, for example. More specifically the automotive industry. It is particularly vulnerable to theft. In fact, in our Webinar “Close the Gap on Insider Threat: Granular Access Controls & Behavior Analytics” , we cited a Deloitte survey where the respondents put the automotive industry at the highest risk of insider cyber threat. This means they need to put serious consideration into protecting their intellectual property in unstructured files, especially when it is handled by multiple parties.
The auto industry is suffering because of the tariff war between the U.S. and China – they’ve got enough to think about in this respect. But, this does not mean they can let their guard down with protecting CAD/CAE designs, that are very critical to their success. It is a very competitive market from both a talent and design perspective. In fact, one of our customers considered themselves the “University of Auto Manufacturing”. This was because they would put time, effort and money into training individuals on their designs, giving them access to their precious CAD/CAE files only to see it walk off on a USB stick perhaps getting into the hands of a competitor. They got tired of that, and took control through discovery and classification, and by using granular access rights.
Fasoo recently sponsored the American Automotive Conference at the MGM Grand in Detroit, MI, September 16th & 17th, where we talked to Engineering and Manufacturing executives seeking solutions to safeguard their intellectual property. We talked to one attendee who said “protecting data going into and out of the machines in their manufacturing environment was the “big challenge”.” And another who was looking to integrate security into its recent standardization on a new PLM platform.
Protecting designs in CAD/CAE files from insider threat and ensuring security across the supply chain and third-party sharing are becoming part of the conversation when developing data governance and policy management strategies. They need solutions that regain control of their unstructured data with particular interests in discovery, encryption and access control.