Eight Steps to Securing IP in the IoT Era

By Karen A. Frenkel  |  Posted 06-15-2015 Email

Product development practices require collaborators to share files across hardware and software teams, projects and geographies. These files, which include source code, hardware design specs, media and project plans, are a company's most valuable intellectual property (IP). They are increasingly exposed to external threats (from contractors or business partners, as well as cyber-criminals) and internal threats (from compromised accounts, malicious or careless employees). To quickly and accurately identify anomalous behavior that can lead to data theft, organizations must shift from a pure perimeter-based security model to a data-centric approach that monitors who accesses sensitive code and how. Organizations must systematically implement security processes and policies specific to their and environments to safeguard important assets from threats. Anna S. Chiang, technical marketing manager at Perforce Software, presents eight steps enterprises can take to secure their IP.

Karen A. Frenkel writes about technology and innovation and lives in New York City.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login Register