Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Securing the 'Company Jewels'

Enterprises struggle with how to define their intellectual property - and how to keep it safe from the bad guys

Of all the data stored by your company, which would be considered "intellectual property" -- and what special steps do you take to secure it?

If your company is like most others, you probably know that intellectual property -- the "other" IP -- is the biggest target the crooks have on their want lists right now. But your methods for discovering and protecting IP are frustratingly manual and time-consuming.

These are some of the conclusions of a new study scheduled to be released by Enterprise Strategy Group next week. The study, sponsored by security tool vendor Reconnex, shows that many enterprises are struggling in their efforts to secure intellectual property.

"When we asked people how they were doing in securing IP, most of them said they felt their organizations were doing a good job, if not excellent," notes Jon Oltsik, the ESG analyst who authored the study. "Yet when we asked them about their spending plans for the coming year, 54 percent said they are going to spend more to secure IP. We see a real disconnect there."

The problem, Oltsik says, is that although enterprises are mostly satisfied that they are keeping their IP safe, they are mostly dissatisfied with the amount of time and effort they have to expend to do it.

Some 55 percent of respondents say they rely on manual scans of file servers in order to identify IP, defining it by content type, keywords, author, or other criteria, according to the ESG study. Sixty-eight percent of organizations said they spend more than 40 person-hours or more each quarter to discover and classify their IP. Fifty-six percent of enterprises with 20,000 or more employees said they spend more than 80 person-hours per quarter on IP discovery.

"This simply can't scale to meet growing security and compliance needs," the study says. Yet, at the same time, the threat to intellectual property is growing all the time. "Attacks are becoming more targeted, more financially motivated," Oltsik says. "The bad guys want to steal what they can sell, and often, that's a company's IP."

As a result, upcoming spending on intellectual property security will probably be geared toward automating the IP discovery, classification, and protection processes, Oltsik suggests. "There are some good emerging tools out there -- tools for doing classification, tools for doing port blocking, tools for doing [data leak prevention]. I think those are areas where we'll see more investment."

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9405
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated reflected XSS via the redirect page.
CVE-2020-9406
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated eval injection via the queryBCP method of the Auxiliary Service.
CVE-2020-9407
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows attackers to obtain sensitive information by reading the IWEBSERVICE_JSONRPC_COOKIE cookie.
CVE-2020-9398
PUBLISHED: 2020-02-25
ISPConfig before 3.1.15p3, when the undocumented reverse_proxy_panel_allowed=sites option is manually enabled, allows SQL Injection.
CVE-2015-5201
PUBLISHED: 2020-02-25
VDSM and libvirt in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H) 7-7.x before 7-7.2-20151119.0 and 6-6.x before 6-6.7-20151117.0 as packaged in Red Hat Enterprise Virtualization before 3.5.6 when VSDM is run with -spice disable-ticketing and a VM is suspended and then restored, allows r...