Customer stories

Boosting Employee Offboarding Security for Cadence

Industry

Systems Design

Employees

10,000+

Use Case

Employee Offboarding

cadence
blue bg
white bg

The challenge

Employee offboarding presents unique challenges for data security, especially with a workforce that’s heavily cloud-driven and more remote than ever before.

Recently, Cadence, a leading electronic systems design company, faced these hurdles head-on.  Presiding over a vast repository of intellectual property — including design documents and source code — the company could not afford to settle for anything less than a robust solution to protect its assets during employee transitions. 

Cadence is constantly under threat that much of their intellectual property, which includes software and software design, could be stolen when an employee leaves the company. Their army of over 10,000 employees had access to massive amounts of sensitive information, from customer databases to strategic plans. In several cases, employees have made off with trade secrets.  

With data sprawled across all types of repositories, much of it unstructured, the biggest hurdle for the company was the inability to clearly identify where all of its sensitive data resided. Sifting through log files in their SIEM and endpoint folders was time consuming, taking the equivalent of 10 people months. The firm’s small security team struggled with ineffective rules-based content segregation and folder-level permissions, leading to manual oversight burdens and potential audit and compliance issues.

Сlose up male hand pointing abstract glowing blue hologram

The solution

Shortly after working with Concentric AI’s team of data security experts on a quick and seamless deployment, a senior engineer leaving the company uploaded large volumes of data to a cloud storage service.

During their final week, they began uploading large volumes of data to a cloud storage service.  

Person using pen and checking the analytics sheet
Concentric AI, monitoring data movement patterns, flagged this activity as suspicious.

The system’s analysis revealed that the data included sensitive project specifications and proprietary algorithms.  

Once deployed, Concentric AI provided insight into the full picture of Cadence’s data risk – identifying 30 to 60 days’ worth of any abnormal behavior – and detected similar insider risk activity from several employees – some unintentional and some malicious.

 

From the customer

"With Concentric AI, we've fortified our offboarding security while greatly improving how we manage data risk across the board. The level of insight and control we've gained over our data movement is unprecedented — like switching on a powerful spotlight in a previously dim room, revealing risks we didn't even know existed."

Sreeni Kancharla

CISO

Results

With Concentric AI, Cadence saw a significant improvement in its data security posture.  

01
Prevention of potential data breaches:

Concentric AI allowed the company to intervene promptly, preventing significant breaches of proprietary information. 

02
Unexpected benefits:

Soon after deploying, the company gained a monumental increase in visibility into data movement and data lineage, allowing for better control and management of its sensitive information. 

03
Massive reduction in man hours:

The ability to detect 30-60 days of insider risk activity was drastically reduced from 10 people months to mere hours, sparing the company from excessive manual efforts.

Explore similar customer stories

Oceaneering
Case Study

Mastering Data Security
in a High-Stakes
Financial Environment