Vault Sprint
If your competitive advantage lives in people's heads, it is not an asset. It is a liability with a notice period.
Find out what intellectual property you actually own, what is genuinely protected, and what is one resignation letter away from becoming a competitor's advantage. Every trade secret, proprietary process, and strategic asset audited against real exposure, not assumed security.
You get a protection framework: what to classify, how to control access, and the enforcement mechanisms that make it stick. Plus a documentation architecture so knowledge becomes organisational, not personal.
One senior consultant. Direct access. No handoff.
Built For
Founders and CEOs who built something proprietary but never formally protected it. The processes exist. The documentation does not.
CTOs and engineering leaders watching key engineers leave and taking institutional knowledge with them. Onboarding takes months because the real processes are not written down.
Legal and compliance teams asked to protect intellectual property they cannot fully identify. Hard to enforce rights over assets nobody has inventoried.
Boards and investors who listed IP as a core asset in the last valuation but cannot point to the protection infrastructure behind it. Claimed value needs demonstrated control.
What You Get
How It Works
Scoping Conversation
Your business model, your competitive landscape, and where proprietary knowledge lives. Who created it. Who has access. What is documented and what exists only as institutional memory. This conversation makes sure we audit the IP that actually matters, not just the IP that is obvious.
Inventory and Exposure Mapping
We catalogue every protectable asset in the business. Trade secrets, algorithms, methodologies, datasets, supplier relationships, pricing models, internal tooling. Then we map every point where that knowledge is exposed: departing employees, vendor contracts, client deliverables, public presentations, open-source contributions.
Risk Prioritisation
Not all exposure carries equal risk. We score each vulnerability by likelihood of loss, commercial impact, and recoverability. The priority matrix separates what needs immediate protection from what needs monitoring from what is acceptable exposure. Some knowledge leakage is the cost of doing business. Some is existential. You need to know which is which.
Build the Protection Framework
Classification and protection system matched to your organisation. What gets restricted and how. What gets shared under agreement. What needs documentation before anyone else touches it. Access controls, handling procedures, documentation requirements, and escalation paths. Not locking everything down. Protecting what matters with mechanisms people will actually follow.
Document and Encode
Proprietary processes get extracted from the people who hold them and encoded into structured documentation. Not generic process maps. The specific decisions, reasoning, and nuance that make your methods yours. Every critical knowledge holder becomes a documented source rather than a single point of failure.
Stress-Test the Framework
Test the protection framework against real scenarios. Departing senior hire. Due diligence request. Vendor onboarding. Conference presentation. Does the system catch the exposure? Do the access controls hold? We iterate until the framework works under operational pressure, not just on paper.
Present, Handoff, and Enforcement Playbook
We walk your team through every finding, every classification decision, and the logic behind each protection mechanism. Questions answered live. Then full handoff: the inventory, the exposure analysis, the protection framework, the documentation architecture, and the enforcement playbook. Everything you need to act. Nothing you need us for.
Pricing
Vault Audit
£8,000
2 weeks
Start this week, deliverables by 19 March
Start here if you suspect your IP is less protected than you think.
- 2 weeks
- Directional
- Clear picture of what’s protected, what’s exposed, and what’s walking out the door.
Vault Build
£14,000
4 weeks
Start this week, deliverables by 2 April
Choose this if you need the audit plus the infrastructure to lock it down.
- 4 weeks
- Actionable
- Every asset documented, classified, and protected with enforceable mechanisms.
- Includes Protection framework, documentation system, access controls, enforcement playbook
Vault Fortification
£22,000+
6 weeks
Start this week, deliverables by 16 April
This one’s for making IP protection permanent, not a one-off project.
- 6 weeks
- Bankable
- Living IP protection system with enforcement mechanisms and continuous monitoring.
- Includes Legal integration support, monitoring protocol, team training, 60-day review
Right Problem. Wrong Scope?
Your IP landscape is not standard. Neither is the sprint. A 30-minute conversation tells us which assets to prioritise, which exposure points to chase, and where knowledge is concentrating in too few people.
Same price. Same timeline. Every hour pointed at the assets your business actually depends on.
No obligation. No pitch. Just specifics.