Resources

On-Demand Webinar

Stories from the Street with a Cybersecurity Veteran: Your Data Is Traveling. Shouldn't Your Security?

Your employees are everywhere. So is your data. Have we equipped our teams to deal with this situation?In this on-demand webinar, cybersecurity industry veteran and Fortra’s Director of Product Management for Data Protection Wade Barisoff will discuss his experience on both sides of the table, both as a Fortune 500 security director as well as leading product direction at Fortra.Our 30-minute...
Blog

How to Lock CAD Files Securely & Protect Your IP

Industrial designs and architectural blueprints are crucial centerpieces of the manufacturing sector’s intellectual property (IP). As the United States strives to reinvigorate its manufacturing sector, computer-aided design (CAD) files require the utmost data protection to safeguard against industrial espionage. Manufacturing is an interconnected industry and a robust arena for technological innovation and IP generation: as far back as 2015, medium-high technology has been responsible for 80% of patents granted to U.S. manufacturing industries. CAD files have become extremely valuable in industrial applications to store system designs and R&D efforts. Understanding how to lock a CAD file securely and effectively is pivotal to protecting its IP information. What’s The Easiest Way to Lock a CAD File? The easiest way to lock a CAD file is with a password. But this is an insufficient approach. Not all CAD applications provide the option of password-protecting a DWG (native format) file. However, Digital Guardian Secure Collaboration offers a holistic approach by providing full, dynamic data protection to safeguard the IP in CAD files. Digital Guardian Secure Collaboration’s partnership with Autodesk and PTC, two of the leading players in the global computer-aided design (CAD) market, gives it a unique advantage and perspective in securing your IP. CAD Security Requires More than Password Protection The Autodesk and PTC partnership allowed Digital Guardian Secure Collaboration to become the first solution to safeguard CAD files with persistent control and security, along with the data contained in Product Lifecycle Management (PLM) systems. While Autodesk and PTC provide strong security, they are stymied in their ability to secure CAD files once they leave the cocoon of their application environments. Digital Guardian Secure Collaboration complements this by providing always-on security wherever the CAD file travels. As a result, Autodesk and PTC can provide users the ability to exert total control over their designs and drawings. The Risks of Leaking CAD Files CAD files comprise more than illustrations, designs, or pieces of drawing. There are several compelling reasons why protecting your company’s CAD files is important. They reveal bits of information that, if shared, can compromise corporate secrets. Locking CAD files is important because they can contain the crown jewels of an organization’s hardwon research and innovation. CAD files are typically used to create blueprints, models, prototypes, architectural plans, and technical drawings spanning a wide range of industries. These files are a prime target by virtue of their IP but also because they are large and data-rich. Here are some of the other risks of leaking CAD files: Valuable IP: The foremost reason to protect CAD files is that they are part of your organization’s intellectual property. Since they contain proprietary and confidential information, those handling the files are legally obligated to safeguard them from intellectual property theft. Reputational risks of breaches/compromise: An organization could suffer reputational risk in the event of data leakage, so protecting your CAD files is also an exercise in brand protection. Compliance liabilities: CAD files are intellectual property and, in turn, are subject to certain legal obligations. Data breaches and leakages may occur with poorly secured CAD files. These incidents will most likely trigger punitive fines and penalties stemming from compliance liabilities associated with data leaks. Lack of effective controls: The manufacturing process often requires project collaboration and sharing with multiple managers, external suppliers, and third-party vendors. While these require granting access to CAD files to various individuals, they usually lack effective controls to protect the content with sensitive designs against intellectual property infringement. Sharing your CAD files without continuous protection ultimately exposes an organization to data leakage, illegitimate, or unintended use of their IP. The Various Ways You Can Protect CAD Files CAD files need to be protected and tracked every step of the way. Here are some of the methods often used to secure CAD files. Converting to Other File Formats Certain categories of CAD file formats are always editable, such as DWG and DXF files. If you need to share these files without worrying about them being illegally modified, you should convert them to PDF or DWF format to make them read-only or uneditable. Secure formats such as DWF and DWFx, developed by Autodesk, are more suited for sharing and distribution outside private networks than DWG files. Another benefit of DWF files is that they don’t require installing AutoCAD to review or use them. Password Protection Among other benefits, password protection prevents unauthorized usage and access to sensitive documents. However, CAD application platforms like AutoCAD and its 2016-based products removed the ability to use passwords. Rather, AutoCAD advocates the purchase of an encryption product to protect CAD files. AutoCAD specifically recommends using a 256-bit protocol with AES symmetric encryption. Here are several methods AutoCAD suggests for protecting design files with sensitive information: Exporting CAD files as PDFs and then subsequently adding a password to the PDF files. Alternatively, package the CAD files as a zip file utility and subsequently add password protection. Utilize third-party encryption and password utility to protect drawing files. Protect CAD files behind firewalls and network permissions. Protect CAD files behind your cloud service provider’s network permissions. Cryptographic Encryption To lock CAD files securely, some application platforms resort to cryptographic cybersecurity methods to create special IP protection that’s securely embedded in the CAD file. Some of these methods are quite ingenious, like combining geometry and cryptography to create and link irreversible hash results to the IP owner on a blockchain. Using Digital Rights Management (DRM) or Information Rights Management (IRM) Organizations can implement robust digital rights management technology to control access to their CAD files and what can be done to their content. In addition to constraining users from access to certain assets, DRM can be used to limit the sharing, printing, copying, editing, and forwarding of proprietary or copyrighted content. DRM achieves this through a variety of means, including limiting the number of users or devices that has access to it and locking access to specific locations, devices, and IP addresses. It also uses dynamic watermarking to denote ownership and discourage the taking of screenshots. Furthermore, DRM allows you to set expiry dates after which access to CAD files becomes disabled. DRM also typically applies encryption to digital media. Information rights management travels seamlessly and unobtrusively with your CAD file and data. IRM also enables organizations to enforce corporate policy to govern the use, control, and dissemination of CAD files. Explore How Fortra’s Digital Guardian Secure Collaboration Helps Protect the IP in Your CAD Files Digital Guardian Secure Collaboration’s ability to extend its dynamic data protection to CAD and PLM systems plugs a vital security loophole for manufacturing companies. In addition to providing manufacturers with CAD out-of-the-box integration, Digital Guardian Secure Collaboration allows you to decide when its dynamic data protection capabilities are enforced. To learn more about how Digital Guardian Secure Collaboration can help secure your CAD files and IP, book a demo with us today.
Blog

Top Intellectual Property Management Software Today

Intellectual property (IP) is pivotal to growing a nation’s economy and fostering innovation. Therefore, IP is granted robust legal protection to spur research, development, and creativity. Thus, the top intellectual property management software allows organizations to manage, track, and optimize their creative and treasured resources. What Are the Top Intellectual Property Management Software Solutions Right Now? Fortra/Digital Guardian Secure Collaboration IPfolio FoundationIP AcclaimIP Wellspring for IP Management What Is Intellectual Property Management Software? Intellectual property management software is an application designed to assist corporations and law firms in IP portfolio management. Its functions encompass everything required to manage IP assets, including the ability to store, organize, and track them effectively. These tools also make it easy to prepare and secure IP rights through the stages of invention disclosure, instituting IP filings, and litigation. Moreover, these applications place core IP features into a centralized platform for streamlined administration. IP management software tracks valued intellectual resources like patents, copyrights, trademarks, trade secrets, royalties, licenses, and overall brand management. They also facilitate patent research, which lets organizations better evaluate their competitive landscape. Benefits Minimizing time-consuming IP operations through automation. Making it easier to detect the theft of IP. Managing the complexity of IP. Improves the efficiency of the IP lifecycle process. What Features and Functionality Should I Look For in Intellectual Property Management Software? IP management software aims to empower businesses to maximize the use of their intangible assets. Here are some of the core functionality found in IP management software: Provide Tools For the Effective Management of IP Assets Overseeing IP resources requires administration processes that ensure intangible assets are efficiently and effectively delivered through these activities. IP portfolio management Document management Deadline management Disclosure management Renewal management Patent and trademark tracking Report and dashboard Facilitate the Intellectual Property Lifecycle Many things go into effectively managing and maximizing a stable of IP assets. It involves many activities, like filing for patents or renewing license contracts, preparing disclosure agreements, and processing client license payments. IP management software facilitates these tasks while tracking the migration of ideas through the IP workflow. Automate Repetitive IP Tasks Automation provides necessary tools for effective enforcement of IP rights. IP management software automates rote and repetitive tasks, especially communication between the myriad of players involved in creating, maintaining, and enforcing IP. Map IP Relationship Rights Patent pipeline visibility is needed to leverage the effective exploitation of IP. This enables businesses to understand which products contain patented technology and which IP is linked to licensing agreements. This is achieved through data visualization and graphical dashboards for a holistic view of the IP ecosystem. Fortra’s Digital Guardian Secure Collaboration While most customers and the general public know Fortra’s Digital Guardian Secure Collaboration as a data rights management company with a diverse product portfolio, the organization also excels in IP management. Digital Guardian Secure Collaboration’s suite of software products is ideal for companies with diverse IP portfolios. Digital Guardian Secure Collaboration provides organizations the wherewithal to track their IP closely across various platforms. As a testament to its robust ability to safeguard IP, General Electric (GE) tapped Digital Guardian Secure Collaboration to protect its substantial IP assets, especially with GE’s global IP footprint dispersed worldwide. Digital Guardian Secure Collaboration has developed deep competencies in protecting data wherever it travels — whether at rest, in use, or in transit. Most organizations forge partnerships and high-level collaborations with external stakeholders, suppliers, and contractors. This inevitably results in plenty of file and information sharing. Digital Guardian Secure Collaboration safeguards these collaborations by securing, encrypting, and tracking sensitive information, whether company secrets, IP data, or end-user personally identifiable information (PII). Pokémon found itself in this conundrum when the popularity of its augmented reality game exploded, putting the protection of its proprietary and user data under pressure. However, they turned to Digital Guardian Secure Collaboration to secure end-user PII and safeguard their IP, especially when employees used them on cloud collaboration platforms. Core Features Facilitating and securing third-party collaboration. Providing seamless integration by baking security into business operations. Active file protection through centralized control and granular visibility. Frictionless security that travels to seamlessly prevent intellectual property infringement. Pros Features extend beyond IP workflows to include data rights management and IP protection. The ability to create enforcement policies based on predefined parameters and pre-existing permission structures such as file location, recipient, securer, etc. Cons It isn’t a traditional IP management software. IPfolio IPfolio from Clarivate is a cloud-based solution that provides comprehensive, end-to-end IP lifecycle management from a centralized hub. It is built for corporate IP teams that manage global IP assets, empowering them to exert maximum control over their IP resources with minimum effort. Core Features: IPSync feature that aligns your US patent records with the USPTO database. Centralized hub to access domain names, inventions, patents, and copyrights. Easily integrates with eSignature and common enterprise legal management (ELM) systems. Highly automated workflow with task-based assignments. Dashboard with a customizable interface and configurable options. Robust reports that automate due date calculations. Pros Allow IP assets to be managed centrally while collaborating across departments. Lightweight and accessible Fosters collaboration across divisions with the advantage of being centrally managed. Interactive patent review process that includes an online investor portal. Cons It can be complicated to understand for some users. Document management could be better integrated into the system. FoundationIP FoundationIP is designed to assist organizations at every step of the IP lifecycle. FoundationIP is ideal for high-performing law firms, helping them to improve their efficiency while reducing risk at each stage of the IP process. Core Features Automate tasks like searching trademark and patent databases, including the United States Patent and Trademark Office (USPTO) office. Facilitating docketing with real-time access to USPTO Private PAIR to discover the status of pending IP applications. Creating custom graphs and charts to highlight key analytics. Prebuilt templates that include out-of-box forms, such as 150+ managed USPTO forms and over 100 system reports. Powerful report builder to create custom reports and email message templates. Pros Effectively streamlining the IP management process. Provide value to clients with in-built collaboration tools. Cons It requires too much administration for small firms. AcclaimIP AcclaimIP provides an online intellectual property system to assist various IP stakeholders, including law firms, patent owners, and patent researchers. The software is geared toward helping agencies and enterprises perform voluminous patent information research and analysis through its automated operations. Core Features Classification and fingerprinting technology to quickly identify the most valuable patents in a portfolio. In addition to search functions, AcclaimIP research helps you to determine or evaluate patentability. Reports that cover core areas of the patent process, such as patent analysis, prosecution analytics, competitor, and technology analysis. Available as a standalone product or integrated with other ancillary IP tools like docketing platforms such as PATTSY WAVE® and Anaqua Services. Pros
Blog

Do you need DLP? Well, do you feel lucky?

Welcome to the first in a series of blogs highlighting Digital Guardian’s recently released eBook, The Definitive Guide to Data Loss Prevention. This post focuses on the commonly asked question of “Do I need DLP?” and covers the driving forces behind DLP adoption.