Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Industrial Espionage

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Espionage
DEFINITION: Espionage conducted for commercial purposes instead of national security purposes both by governments and by private organizations. Corporations have been known to spy on their competitors to gain a competitive advantage. Spying may involve the theft of trade secrets and/or the secret removal, copying, or recording of confidential or valuable information for use by a competitor.
Industrial EspionageWhite Papers (View All Report Types)
1 - 25 of 67 Matches Previous Page  | Next Page
A Guide to Data Privacy for Business and IT Executives
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

IntraLinks, Inc

Attacks on Point of Sale Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

Beyond Work-Life Balance
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper takes an uncommon look at how – thanks to mobile and cloud technologies – the world of work is changing and why. Specifically, it focuses on ways IT leaders can be proactive about building a work environment that's ready for the future.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

Hewlett-Packard Limited

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

2010 Threat Report
sponsored by Websense, Inc.
WHITE PAPER: Websense® Security Labs™ uses the Websense ThreatSeeker® Network to discover,classify, and monitor global Internet threats and trends. Featuring the world’s first Internet HoneyGrid™, the system uses hundreds of technologies to parse through more than 1 billion pieces of content daily,searching for security threats.
Posted: 11 Jan 2011 | Published: 11 Jan 2011

Websense, Inc.

A New Model for Healthcare Transformation
sponsored by Dell, Inc.
WHITE PAPER: This paper provides an overview of the major issues that are driving support for care transformation. More importantly, it outlines an approach for achieving value from the IT investments made by health care organizations in support of transformation initiatives.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Achieving Value in Healthcare Through Efficiency and Effectiveness
sponsored by Dell, Inc.
WHITE PAPER: this white paper demonstrates how, by reforming health care delivery, implementing appropriate technology, and reshaping the medical establishment which supports efficiency and effectiveness, America can provide the best value in health care services for its citizens.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett-Packard Company
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 21 Nov 2013 | Published: 31 May 2012

Hewlett-Packard Company

Advancing Healthcare through the Application of Predictive Knowledge Management
sponsored by Dell, Inc.
WHITE PAPER: This white paper examines how the health care industry can proactively support patient-focused care through the use of technology services that enable predictive analysis.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Becoming a Social Business: The IBM Story
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

Better Healthcare Starts with Better Information
sponsored by Dell, Inc.
WHITE PAPER: This white paper examines Dell's holistic solutions, bringing together implementation services, process improvement consulting and customized IT technology so caregivers have better information for better patient care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Building a Robust Business Case for High Quality Master Data
sponsored by Melissa Data Corp
WHITE PAPER: This white paper explains the key elements for building a proper, quantified business case. It presents the measures that are favored by corporate finance departments, and helps develop a strong business case for data quality and MDM projects. A number of real-life examples with quantifiable benefits are also included.
Posted: 19 Apr 2010 | Published: 01 Feb 2010

Melissa Data Corp

Building an ESB without Limits
sponsored by IBM Software Group
WHITE PAPER: This white paper dives deeper into the area, to answer why you need one in an SOA, and what the ESB will do for you.
Posted: 05 Dec 2007 | Published: 01 May 2007

IBM Software Group

Case Study: Top 5 Communications Company Evaluates Leading eDiscovery Solutions
sponsored by AccessData Group
WHITE PAPER: The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology.
Posted: 11 Apr 2011 | Published: 06 Apr 2011

AccessData Group

Challenges & Strategies for UK Annuity Providers
sponsored by Wipro Technologies
WHITE PAPER: This white papers talks about the challenges facing the UK annuity market and the strategies that can be taken by the product providers to meet them. The paper also talks about how Wipro can partner with providers to tap the opportunities present in the marketplace.
Posted: 13 May 2009 | Published: 11 May 2009

Wipro Technologies

Choosing the Right Enterprise Resource Planning (ERP) System: How to Avoid the 7 Fatal Flaws
sponsored by CDC Software - Ross Enterprise
WHITE PAPER: This paper explains the importance of choosing the Right Enterprise Resource Planning (ERP) System to avoid the 7 Fatal Flaws.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

CDC Software - Ross Enterprise

Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks
sponsored by OpenText
WHITE PAPER: This white paper explores the potential compliance related benefits to adopting fax server technology.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

OpenText

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

Evolution Vs. Revolution: Driving B2B Efficiencies Forward with People, Processes and Technology Tools
sponsored by SEEBURGER
WHITE PAPER: B2B integration technology, offers powerful and complementary tools and services for seamless business integration and meeting the challenges of global collaboration.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

SEEBURGER

Expanding Active Decision-Making: The Power of Integrating Business Rules and Events
sponsored by Red Hat and JBoss
WHITE PAPER: This white paper demonstrates how using JBoss Enterprise BRMS, business analysts, developers, and integrators can create and manage rules and events in a single product using a shared set of authoring tools.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Red Hat and JBoss

First Annual Cost of Cyber Crime Study
sponsored by ArcSight, an HP Company
WHITE PAPER: Despite widespread awareness of the impact of cybercrime, cyber attacks continue to occur frequently and result in serious financial consequences for businesses and government institutions.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

ArcSight, an HP Company

Five Procurement Guidelines You Can't Afford to Ignore
sponsored by StarCite
WHITE PAPER: Here is a list of 5 guidelines that companies should keep in mind as they create their spend management program: Data Consolidation, Preferred Vendor Program, Legal Oversight, Company-wide Visibility and Coordination.
Posted: 29 Aug 2008 | Published: 29 Aug 2008

StarCite

From Fear to Value: CIO strategies for propelling business through the economic crisis
sponsored by IBM
WHITE PAPER: Your aspiration: As a CIO, drive change, innovation and efficiency to help build a smarter enterprise that will prosper amidst global competition. Your daily challenge: As a CIO, deliver business results faster and better–with less. This whitepaper outlines key strategies for CIOs to drive business results through the economic crisis.
Posted: 18 Jun 2010 | Published: 17 Mar 2009

IBM

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave

Handbook: Architecting an Agile Enterprise
sponsored by SearchCIO.com
WHITE PAPER: This white paper takes an in-depth look at the relationship between Agile business practices and mobile computing. Inside, learn more about the balancing act many modern businesses face when trying to provide a quick turnaround for mobile applications on a limited budget.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

SearchCIO.com
1 - 25 of 67 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement