The landscape of trade secret theft counterfeiting and piracy continues to change and evolve NASCAP members who are Technological Solution providers have a wide variety of technological means or prevention ,detection ,verification and enforcement of IPR. For protection of trade secrets, technological solutions compliment solutions in resource management, policies and physical controls.
For protection of trade secrets, it’s assumed that basic security technology based controls protecting networks and systems have already been implemented.
NASCAP members provide technology which a focused of protecting private data. These include technological solution,data classification and labeling.
Some of these solutions are fully automated.
Once the data is classified , it is labelled and suitable meta data attached.
This meta data can be read by downstream solutions that will protect the data.
Detection tools employing behavior analytics and deception have become available. This capability can be stand alone or a part of another solution.
On the deception side ,there are tools which apply “honey pots” and “honey token”.
A honey pot technology is used to detect intruders attacking trade secret data. The honey token are embedded in word documents, spreadsheets, etc and send a notification whenever a trade secret is accused. Both of these technology are especially applicable in a distributed environment.Trade secret data is located at multiple locations on multiple platforms.