
No Matter the Size of Your Organization, We Provide Services that Fit Your Needs
How We Help
-
RedBook+
With the rise of enforcement actions from Federal research grant funding authorities, research organizations are searching for solutions to identify and resolve their foreign influence risks related to undisclosed foreign research collaborations and funding sources.However, fearing hefty financial penalties and reputational damage, many organizations have been compelled to purchase multiple, expensive databases, hire large teams of analysts, and use intrusive approaches to research security management that can alarm and alienate researchers, principal investigators, faculty, and students. Yet, despite these efforts, it has often proven to be time-consuming and labor-intensive, with minimal results.
We built RedBook, a cloud-based platform designed to instantly give you actionable insights on your foreign influence risk. RedBook is a cost-effective, one-stop shop for quickly processing and identifying risks, saving you time and resources.
-
Innovation Defense Academy
Innovation Defense Academyᵀᴹ is a library of regularly updated micro-courses that provides an effective and efficient online learning experience. Users have access to micro-learning courses that are "straight to the point" and cover current, relevant topics related to research security and insider threat risks.
For just $50 a month per learner, Innovation Defense Academyᵀᴹ is an effective solution to prepare you and your employees against insider and outsider risks and create a culture of security.
For organizations, from small businesses to large institutions, we also offer special enterprise pricing. Please contact us for enterprise-level pricing.
-
Research Security Officer Training
IPTalons partners with large companies and research enterprises working in critical technology sectors to assess and improve the effectiveness of their insider risk management programs. We assist with strategic risk management plans, merger and acquisition due diligence checks, high-risk employee terminations, external partner vetting activities, and supply chain security assessments. We also conduct user behavior monitoring and insider threat investigations.