Case study

How eCapital Secured Data at the Moment It Actually Moves

endpoint security-eCapital logo

Challenges

eCapital's goal was clear: understand how data flows through their organization in real time, who is touching it, where it is going, and whether that movement is authorized.

Conventional approaches to data visibility, classification, DSPM, static data mapping, were never designed to follow data as it moves. They produce a picture of where data lives, not what happens to it the moment a user touches it.

"From a data flow and data movement perspective, those controls amount to zero. We did not want to spend time, effort, and funds on classifying the data estate. You can still have the data stolen, ransomed, exfiltrated. With Bold, we can see how users interact with the data and what they are actually doing with it, and then do something about it. We loved Bold’s innovative approach to identity-centric, user access focus on data handling, throughout the enterprise and outside the enterprise boundaries."
Stefan Lesaru, VP, Technology & Compliance

The Gap - No Existing Tool Was Built to Close

Modern user behavior has outpaced the tools designed to govern it. Users paste proprietary information into public AI models, & without realizing it enters the public domain. Files get compressed, renamed, and sent through channels that bypass every perimeter control. These are not sophisticated attacks, they are everyday behaviors that static, classification-based tools are architecturally incapable of seeing or addressing.

DLP was not the answer either. It relies on rigid rules, has no visibility into the browser or AI activity, and can be bypassed with trivial techniques.

"With DLP, you do not have visibility in the browser or into other areas where users operate. Users do not realize they are putting information into the public domain, pasting proprietary data into public AI models, things that are escaping every other tool."
Stefan Lesaru, VP, Technology & Compliance

Solution

eCapital deployed Bold's on-device AI platform to accomplish what other solutions could not, real-time visibility into how data moves, & data flow use cases with the ability to act on it in real-time and prevent the risky action.

Because Bold runs locally on the endpoint, it classifies data as it moves and enforces policy at that exact moment, before exposure occurs.

"You can see the flows, you can see what users are doing without even configuring policies, right out of the box when deployed."
Stefan Lesaru, VP, Technology & Compliance

Within weeks, Bold surfaced behaviors no other tool could see, proprietary data pasted into public AI models, files renamed and exfiltrated through channels that bypassed every perimeter control, unauthorized data movement across browsers and external services.

Results

  • Stopped AI data exfiltration in real time, catching data moving to public models or throughout the enterprise, unauthorized before it left the device
  • Prevented sensitive data from leaving the organization through channels that bypassed every existing control
  • Enforced data policy at the moment of risk, without waiting for alerts, investigations, or manual review
  • Protected the organization at scale, without additional headcount or a dedicated monitoring function
The Bottom Line

"With Bold, the risky behavior gets captured and can’t be bypassed. It has the AI visibility layer built in. And it accounts for the reality of how users work today."

Stefan Lesaru, VP, Technology & Compliance

Classification was always trying to answer the right question.
Bold answers it in real time, on the device, the moment data moves and it can be bound to the users’ actions. That was eCapital’s goal, and Bold helped the organization achieve it.

  • Financial Technology Services, with a large client base
  • Handles highly sensitive PII, proprietary financial data, and confidential client information
  • Security-forward organization managing rapid AI adoption across a globally distributed workforce
Solution

eCapital deployed Bold's on-device AI platform to accomplish what other solutions could not, real-time visibility into how data moves, & data flow use cases with the ability to act on it in real-time and prevent the risky action.

Turn your endpoint into your security agent
See Bold Live

Turn your endpoint into your AI security agent

See Bold Live