Products + Services

We designed our products and services to help you assess and manage risk, making it possible for you to make informed decisions and move forward with confidence during your global engagements.

Our products include subscription-based security services to research security, compliance, and audit teams to identify, assess, investigate, and remediate insider and outsider risks, including foreign influence threats.

Identify Your Risk with RedBook

Foreign Influence Risk Detection Portal

With the rise of enforcement actions from Federal research grant funding authorities, research organizations are searching for solutions to identify and resolve their foreign influence risks related to undisclosed foreign research collaborations and funding sources.

However, fearing hefty financial penalties and reputational damage, many organizations have been compelled to purchase multiple, expensive databases, hire large teams of analysts, and use intrusive approaches to research security management that can alarm and alienate researchers, principal investigators, faculty, and students. Yet, despite these efforts, it has often proven to be time-consuming and labor-intensive, with minimal results.

We built RedBook, a cloud-based platform designed to instantly give you actionable insights on your foreign influence risk. RedBook is a cost-effective, one-stop shop for quickly processing and identifying risks, saving you time and resources.

Resolve Your Risk with RedBook+

Powered by RedBook, RedBook+ is an annual subscription that provides the tools and services you need to resolve your risk, allowing you to comply with federal and state research security regulations.

RedBook+ subscriptions includes:

  • A customized RedBook dashport to visualize your research security and compliance risks in your research and patent portfolios

  • Access to an online research security program assessment tool to determine your readiness to meet the compliance requirements

  • Express COI Veracity Checks that verify the accuracy of your researchers’ foreign collaboration and funding disclosures

  • A comprehensive review and gap analysis of your policy framework to establish good research security practices

  • A step-by-step research security program implementation and how-to guide and roadmap to establish your program’s strategic plan

  • Deep-dive reporting to collect relevant open-source information to inform research security incident management decisions

  • Access to IPTalons SMEs and Analysts to provide advice, coaching, support, and input on program implementation and management

Innovation Defense Academy

Putting People First: Efficient Training Designed to Promote an Effective Security Culture

Most employees, contractors, and supply chain partners are unaware of the internal and external threats posed by foreign influence, nation-state-sponsored, and commercial competitive threat actors that exploit well-meaning people with access to research, trade secrets, and proprietary information. As a result, 95% of insider IP loss and theft is unintentional. Learn to protect yourself, your teams, and your intellectual property from espionage, competitive theft, and accidental public disclosures.

For a $50 per learner monthly investment, you will have full access to the Innovation Defense Academy, a micro-course library designed to promote best research security practices for employees at every level. We also offer enterprise pricing to meet your organization’s needs.

Building the security awareness and defensive skills of your most valuable team members (i.e., those individuals with access to your "crown jewels”) is an intelligent investment.

Innovation Defenderᵀᴹ

Critical technology sector companies, university startups, early-stage companies, supply chain partners, and other cutting-edge technology R&D organizations often do not have the internal expertise to effectively manage insider risk and trade secret protection programs. Our Innovation Defenderᵀᴹ provides an affordable solution to manage your insider and outsider risks by creating a solid compliance policy framework, educating your employees and contractors, and having executive-level security advice to assess your risks and come up with a remediation strategy. LEARN MORE