Overview
Multi-Space Network enables controlled cross-pollination of intelligence between spaces, with privacy-preserving pattern detection. Organizations with multiple engagement spaces can discover thematic patterns across them without exposing client-specific details.
More spaces means more value per space — a powerful retention mechanism and natural enterprise upsell.
The Problem
- Organizations with multiple knowledge spaces (per client, per project, per department) operate in silos by default
- Patterns visible across spaces — industry-wide trends, recurring challenges, cross-project learnings — are invisible to individual space users
- Consulting firms, PE portfolios, and multi-brand companies have the most to gain from cross-space intelligence but the most to lose from privacy violations
- No tool offers cross-space intelligence that respects confidentiality boundaries
- Organizational leadership wants macro-level insights but lacks visibility across compartmented data
How It Works
- Opt-in participation — Space admins explicitly enable network participation and set sharing rules (topic-level patterns only, anonymized summaries, or full cross-space access)
- Cross-space pattern detection — After exploration prep runs in any space, compare cluster themes against clusters in other participating spaces using embedding similarity
- Anonymization layer — Strip client names, company names, specific figures, and identifying details from cross-space summaries
- Network-level insights — Surface patterns like "3 of 5 spaces show rising concern about [topic]" without revealing which 3
- Network exploration — With elevated permissions, enable a cross-space view that spans multiple spaces
- Network reports — Periodic synthesis of cross-space patterns for organizational leadership
User Story
A consulting firm has 15 client engagement spaces. An analyst working on a supply chain project for Client A gets a notification: "2 other engagements have identified similar supply chain disruption patterns in Southeast Asia. Anonymized summary available." They can see the pattern without seeing client-specific details. The firm's leadership gets a quarterly "Network Intelligence Report" showing thematic patterns across all engagements — "Supply chain resilience is the #1 emerging theme across 7 engagements, up from 2 last quarter" — enabling them to proactively develop service offerings.
Complexity & Timeline
| Aspect | Detail |
|---|---|
| Complexity | Complex |
| Estimated Build | 6–8 weeks |
| Platform Dependencies | Explore (clustering), Feeds, Inferences, RLS/permissions system |
| New Infrastructure | Cross-space embedding comparison, anonymization pipeline, network analytics, consent/audit logging |
Target Clients
- Personas: Managing Partners, Portfolio Directors, Chief Strategy Officers, Division Heads
- Verticals: Consulting, Private Equity/VC, Multi-brand Holding Companies, Government Agencies, Law Firms
- Pitch: "See the patterns across your portfolio — without breaking confidentiality walls."
Revenue Potential
Enterprise-tier feature that justifies premium pricing — cross-space intelligence creates organizational network effects where more spaces = more value per space. Natural fit for consulting firms (cross-engagement intelligence), PE/VC firms (portfolio-wide patterns), and multi-brand companies. Supports tiered pricing: basic (isolated spaces), professional (anonymized patterns), enterprise (full network analytics). Long-term opportunity: cross-organization anonymized benchmark data across Condelo customers.
Feature Synergies
- Living Battlecard — Cross-engagement competitive intelligence enriches individual battlecards
- Blindspot Detector — Network-level gap analysis reveals what the organization as a whole is missing
- Collaborative Sensemaking — Cross-space investigations with proper access controls
Risks & Open Questions
- Privacy-preserving computation must be robust — re-identification risk from anonymized summaries is a real concern
- LLM-powered anonymization is not guaranteed to catch all identifying information
- Consent and audit logging must be comprehensive for regulated clients
- Embedding similarity for cross-space comparison may surface spurious matches in diverse corpora