ZyLAB Launches Intellectual Property Protection Program For Big Data

Wednesday, December 4, 2013 - 12:26

ZyLAB has launched an extensive protection program to protect Intellectual Property (IP). The new program includes components of the ZyLAB eDiscovery and Information Risk Management Platform, best practice templates, implementation guidelines, and customizable, multilingual libraries to localize and protect intellectual property. 

In today’s global economy the value of an enterprise’s Intellectual Property (IP) assets is very important. In many companies, however, IP is not only stored in well-protected or encrypted repositories, but also resides on personal computers, laptops, home computers, removable storage, in cloud locations such as BOX.net or in personal email boxes. This vast amount of big data is often unstructured, unprotected and of unclear ownership, exposing any IP to risk of theft or leakage. The ZyLAB Intellectual Property Protection Program has been developed to support commercial organizations in protecting these important assets. 

With ZyLAB's eDiscovery and Information Risk Management System companies can locate Intellectual Property on their computer systems and actively prevent leakage or theft of this sensitive and valuable information. A user-installable library containing best practice methodology for eDiscovery enables the automatic identification of files that may contain IP. The library is available as an add-on to the ZyLAB platform. 

By automatically identifying information containing Intellectual Property, it is easy to identify employees with a disproportional amount of IP in their personal storage locations, email or other locations. 

Johannes Scholtes, chief strategy officer of ZyLAB, commented, “The consequences of a security breach can be very serious. We’re not only talking about the cost of resolving the breach and the potential loss of revenues, but a security breach also exposes a company to potential lawsuits. By supporting periodic risk assessments, ZyLAB helps organizations to optimize their information security and prevent data leakage. Our customers use our technology to identify misplaced confidential documents or files containing IP or . . .  to identify users with large amounts of IP in email or files so appropriate action can be taken, before anything happens. Especially in case of fraud, IP theft or data leakage, prevention should be preferred over the cure.”