Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

No cookies to display.

Manufacturing

Manufacturing

Manufacturing


Overview

Modern manufacturing requires collaborative supply chains throughout the entirety of the product manufacturing lifecycle, increasing the risk of data loss. Not only do firms need to protect their data within their environment, but they also need to trust that their data is being protected beyond their perimeter and outside of their control, by their vendors and suppliers. “Trust” of course isn’t a security mechanism – the paradigm of managing risk in the supply chain must shift to enable organizations to protect their data wherever it goes, forever.

Situation & challenge

A global manufacturing firm had an opportunity to win a highly lucrative contract as a supplier for a third-party engineering firm and aimed to differentiate themselves as the most secure vendor for the job. As part of this potential project, the manufacturing firm’s engineers on the factory floor would be handling the sensitive information, such as schematics and engineering drawings, belonging to the third-party. With various regulations and standards at play to ensure the protection of the highly sensitive information (such as EAR99, NIST, and soon, CMMC), the firm needed to demonstrate why they were the best choice to fulfil the contract, while minimizing internal friction and costs.

Ensuring that front line workers were able to seamlessly access critical data with no disruption to their typical workflow was essential for keeping costs down and maintaining efficiency and productivity. An easy to use, yet robust mechanism for multisite comprehensive data protection seemed like an impossible task given the typical trade-offs.

Previous attempts of legacy approaches to lockdown data, such as by using data loss prevention (DLP) technologies had proven difficult to manage and highly disruptive to factory operations. DLP’s perimeter-focused approach failed once sensitive files left the network, which is challenging to address in their multisite multiparty supply chains. Once the data was gone, it was gone for good with no control, protection, or visibility. Additionally, the complex configuration and management at the administrative level, in addition to slow performance, disruption to business processes, and excessive false positives resulting from DLP forced the firm to seek new solutions to combat data loss.

Solution

Using Keyavi, the manufacturing firm successfully won the multi-million-dollar bid, demonstrating the exceptional care that they were taking to protect their partner’s sensitive information with a zero-trust and data-centric approach. Keyavi provided them with a solution that enabled real time policy-based data access control in perpetuity, supported by industry-standard encryption.

By implementing Keyavi’s self-protecting data, the risk of insider threat, where workers may attempt to copy or share the files with others or their own personal accounts, is eliminated. Access is restricted solely to those authorized and within the confines of the policies (such as geolocation and time-window) set by the administrators, allowing the firm to meet requirements dictated by ITAR, EARS, and others.

For additional security and investigations, administrators are now able to leverage existing SIEM and SOAR functionality built into Keyavi-protected data and also integrate the Keyavi chain of custody forensic transactions directly into their existing SIEM/SOAR tool. Admins can view details of every access attempt, whether successful or not, and drill into the forensics of each attempt in these chain of custody logs. When the project is complete, access to the files (including any copies made) can be revoked entirely, satisfying access control and retention requirements.

The firm successfully shifted the paradigm by using Keyavi to infuse security into the data itself, allowing the data to become self-protecting and intelligent, with perpetual security, control, and visibility whenever it went. Selfprotecting data eliminated the complexity associated with legacy protection measures, while allowing for seamless usage by factory floor workers to keep productivity up. As Keyavi’s cutting-edge data protection is being introduced across the industry, gaining that competitive edge and confidence that your data – and your third-party’s – is secure will set you apart and you can focus on your own innovations, productivity, and revenue.

Leave a Reply

Your email address will not be published. Required fields are marked *