Strider launches risk intelligence tool to secure intellectual property

It will help the enterprises to identify potential threats to IP by checking online interactions of employees with the individuals that connect with the company

Strider launches risk intelligence tool to secure intellectual property

In order to secure intellectual property (IP), Strider Technologies has brought forth a risk intelligence tool. It will help the enterprises to identify potential threats to IP by checking online interactions of employees with the individuals that connect with the company. The Strider Shield platform will have many online tracking tools that are usually used by advertising agencies, together with data ingestion tools, natural language processing (NLP), and different algorithms to help organizations to perform better in identifying possible risks to processes and individuals at the time of development.

Eric Levesque, CEO of Strider told that Strider Shield can gather more data points like email addresses, domain names, keywords, and other terms. It can be correlated against internal systems where IP is present to find risk elements. This method will make it easier to identify risk signals used by known actors as they interact online. It will also enable to include economic statecraft analysis to find the source point of threats. He added that the theft of IP has become a “geopolitical issue.” The method followed by Strider secures data online so that it will not become a privacy issue. The company correlates data to organizations to help in identifying threats. Organizations have started to focus on security processes and the people that manage them. Cyberattacks have begun to make use of weaker points in the processes rather than attacking systems and applications as such. Levesque added that organizations are joining the cyber and physical security management to protect employees and their IP. If an IP is stolen, then organizations have to spend billions on it. That is why there is an increased effort in protecting IP and preventing a cloned product or service launch in a different country.

It was found that many nation-states regularly steal IP from companies. The companies launch products without knowing that the IP was stolen, only to find a cloned product in the market. It will surely decrease the return on the product. It affects the economy and revenue of not only the company but also the country. There is no single fully efficient method to stop the theft of IP. But potential threats can be identified and reduce the risks. The emergence of threat vectors should be taken into account to review the security of the organization and its IP.