Data Theorem > Case Studies > Enhancing API Security and Governance for Thrive TRM with Data Theorem

Enhancing API Security and Governance for Thrive TRM with Data Theorem

Data Theorem Logo
Technology Category
  • Application Infrastructure & Middleware - API Integration & Management
  • Application Infrastructure & Middleware - Event-Driven Application
Applicable Industries
  • National Security & Defense
Applicable Functions
  • Quality Assurance
Use Cases
  • Leasing Finance Automation
  • Tamper Detection
Services
  • Cloud Planning, Design & Implementation Services
  • System Integration
About The Customer

Thrive TRM is a software company established in 2014 that provides modern recruiting software built for the fastest growing executive search firms. They serve Fortune 100 companies, providing them with a talent database of eligible candidates for hard-to-recruit positions. Thrive develops cutting-edge applications that help recruiters and talent executives make better hiring decisions. Their collaborative, easy-to-use features allow users to spend less time managing a database and more time advising the hiring team. Elite search firms, VC/PE firms, and in-house recruiters around the globe use Thrive TRM to reduce search times and improve outcomes for hiring managers. Therefore, it is crucial for Thrive to protect the data of these high-ranking professionals.

The Challenge

Thrive TRM, a leading provider of modern recruiting software for executive search firms, faced a significant challenge in securing their application’s full stack. The security team at Thrive TRM was constantly discovering new attack surfaces within both client and cloud endpoints. They needed a solution that could not only secure these surfaces but also track and discover any new APIs. The team was also in search of a Security Orchestration Automation and Response (SOAR) platform that could meet these needs. During application penetration testing, Thrive realized the importance of assessing the risk associated with their application’s attack surface. They found that while some tools could identify application attack surfaces, they often failed to identify data that circumvented network firewalls and WAFs, and daily changes that kept up with the CI/CD lifecycle. This left their application vulnerable to attackers.

The Solution

Thrive TRM chose Data Theorem as their solution provider, impressed by its ability to identify data leakage that had previously gone undetected. They found that they needed API security beyond what their cloud provider prescribed to them. Data Theorem's automated process of creating secure code for developers and the ability to test different solutions by scanning before going into production proved immensely beneficial. The Thrive team expanded their use of the product to 17 users. Furthermore, Thrive leveraged the Data Theorem platform to enforce corporate governance policies. When issues were found by the Data Theorem analyzer engine, they were automatically flagged with remediation details. The Data Theorem support team also provided additional information on each issue, informing Thrive about what data was at risk and how hackers could exploit these vulnerabilities.

Operational Impact
  • After implementing Data Theorem solutions, Thrive TRM saw significant improvements in their TRM security responses. As recruitment personnel and strategies transition to a fully virtual model, Data Theorem has become vital in providing the necessary support for Thrive to evolve seamlessly towards a cloud-oriented business model. This partnership has allowed Thrive and Data Theorem to find a new normal in the industry and better prepare for the future. The Data Theorem support team has acted as Thrive’s go-to security experts, providing additional information on each issue and informing Thrive about what data is at risk and how hackers can exploit these vulnerabilities.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.