Theft of trade secrets is more topical than ever. According to the United States Government, theft of American IP currently costs between $225 billion and $600 billion annually, and part of this stems from cyber attacks.
Technical documentation and CAD designs more shared than ever
The current trend in automation and data exchange in manufacturing technologies are responsible for the major transformation of the industrial sector known as Industry 4.0. The basis of the new smart industry entails thorough automation of factories, digitalization of the production processes and new communication channels. This increases the possibility of organized cyber-attacks since information that used to be kept inside the network security perimeter is now shared with various external systems and agents. R&D investment in this sector is more important than ever before due to the rate of change and the need to adapt to the new environment. Digitalisation also means that there are more and more data in digital format that must be shared not only internally but also with partners, subcontractors, etc. The challenge is to maintain optimum communication processes while ensuring that the company’s intellectual property is safeguarded.Industrial trade secrets. In the crosshairs of cyber attacks
Just in Europe there are about 2000 companies specialized in manufacturing that employ more than 30 million people directly. The sector is particularly prolific in terms of patenting and R&D. If we look at how data leaks occur in companies, we see that a large part of them come from external suppliers (see Forrester’s Global Business Technographics Security Survey). Through a targeted attack on a partner, or through a security incident at a supplier, our information can be left unprotected, even though we have put in place measures within our organization to secure our working environment.
Customers expect that the information they share with their manufacturing and engineering suppliers will meet their information access control and protection criteria. A data-centric protection approach will comply with the strictest audit and protection policy criteria imposed by your customers.
What type of industrial information is at risk?
The following are examples of practical cases in which the data generated by manufacturing, energy, automotive and engineering companies etc. must be protected:- Support documentation containing details of components, that are exchanged with customers, suppliers or manufacturing partners.
- Results from research that could be patented and we store in every type of digital formats (Word, Excel, PDFs, etc.).
- CAD designs created in tools such as AutoCAD, Dassault Systemes SolidWorks, Siemens NX, SolidEdge, etc., that contain details of components and are shared with internal and external recipients.
- Data related to processes that may be exchanged with distributors in various markets.
- Proposals made to customers to compete with other companies and which contain sensitive information on the company’s competitive advantages.
- Internal quality guidelines that contain know-how related to company’s production processes.
- Compliance with customers’ protection audits and policies, ensuring that the data they share with you are audited and protected by access control.
“What makes SealPath very interesting is the possibility of revoking the privileges of user access to any file when it is no longer necessary, remotely and wherever the copy of that file is stored” Vittorio Cimin. IT Manager – Bricofer
What can we do to protect our more sensitive files?
Below, we outline 6 steps that can be taken to protect our intellectual property and CAD files in our organization and throughout the supply chain: 1) Protecting intellectual property information sent by email to collaborators: One of the main forms of data sharing remains email. We continually send attachments with sensitive information to subcontractors, prospects, partners, etc. Applying rules to emails and attachments that allow us to control who accesses them, when, with what permissions (e.g. only viewing, editing, but not copying and pasting or printing, etc.) will help us keep our data under control, even if it is in the hands of the recipient.
2) Protect CAD designs and documentation in information repositories: In every company, sensitive documentation is stored in repositories such as File Servers, SharePoint, OneDrive, Box, Office 365, etc. Even if access controls are applied to the folder, we know that once downloaded we have lost control over them. It is necessary to have a protection that travels with the data so that, even if they have been downloaded, I can still have control over them in the same way I have when they are in the repository.
3) Protect the sensitive corporate data you share via collaborative work applications such as Slack or Microsoft Teams: It is an alternative communication channel to email and is becoming increasingly widespread for intra-corporate communication. Many sensitive files leave our repositories to our platforms so we must not forget to apply protection to them also when they travel by these means.
4) Protection of files downloaded from corporate applications: There are many applications developed internally in the corporations that allow exporting or downloading data in file format. Applying protection right at the moment the file is downloaded will help us have control over it wherever it travels.



“The main benefit SealPath offers is the ability to protect the information that carries the most weight for the company. Knowing that we have control over it both inside and outside the organization is critical because it allows us to send it to third parties without risk.” Alberto Solís. Planning and Strategy of Information Systems Manager. ProdielAll these protection measures I can apply with SealPath which offers a data-centric approach to protection. SealPath allows you to protect your sensitive documentation and CAD designs regardless of their location. You can control who accesses, when, with what permissions (view the design or modify it, but not print it or save it unprotected).

- CAD designs in .DWG, .DWF, DWS, .DWF, or .DWT format, managed in AutoDesk AutoCAD (Electrical Mechanical, Civil, LT, etc.) or in applications such as TrueView.
- AutoDesk Inventor 3D designs in .IPT, .IAM, .IDW, .DWG, or .IPN format so you can limit permissions on content (i.e. view and modify but not extract data)
- Intellectual property contained in Siemens Solid Edge in .ASM, .DFT, .PAR, .PSM or .PWD formats. Check if someone can print it, export it, modify it and audit all accesses.
SealPath goes beyond the protection of information in office formats and offers a unique solution for the protection of trade secrets and intellectual property in the form of CAD designs. Find out how in upcoming articles or contact us directly for a CAD file protection demo.
About SealPath
SealPath is the European leader in Data-Centric Security and Enterprise Digital Rights Management, working with significant companies in more than 25 countries. SealPath has been helping organizations from different business verticals such as Manufacturing, Oil and Gas, Retail, Finance, Health, and Public Administration, to protect their data for over a decade. SealPath’s client portfolio includes organizations within the Fortune 500 and Eurostoxx 50 indices. SealPath facilitates the prevention of costly mistakes, reducing the risk of data leakage, ensuring the security of confidential information, and protecting data assets.
About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

