Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >  

Intellectual Property

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Property that derives from the work of the mind or intellect, specifically, an idea, invention, trade secret, process, program, data, formula, patent, copyright, or trademark or application, right, or registration.
Intellectual PropertyWhite Papers (View All Report Types)
1 - 25 of 34 Matches Previous Page  | Next Page
Best Practices Guide: Tools for Threat Intelligence and Incident Forensics
sponsored by DomainTools
WHITE PAPER: In this white paper, discover a suite of tools that can be used to identify the perpetrator of a cybercrime, build a profile of a cyber-attack, and proactively protect your data, infrastructure, and intellectual property.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

DomainTools

Top Three Tactics Advanced Attackers Use to Breach Pharmaceutical Organizations
sponsored by FireEye
WHITE PAPER: This essential white paper breaks down the top three most dangerous methods malicious attackers employ and evaluates strategies that can safeguard your sensitive data against them.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

FireEye

All Data Archive Tools Are Not Created Equal: The Importance of Index and Search
sponsored by Rand Secure Data
WHITE PAPER: Find out how a comprehensive archiving solution with index and search capabilities can help your company maximize the value of intellectual property, and contribute to successful data governance.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

Rand Secure Data

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

An Inside Track on Insider Threats
sponsored by Imperva
WHITE PAPER: Read this informative report for details on the impact of insider threats, as well as recommended strategies for businesses to apply in preventing and remediating these critical issues.
Posted: 11 Jul 2014 | Published: 31 Dec 2012

Imperva

Three Critical Decisions You Need to Make at the First Sign of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover three critical questions you should be prepared to answer quickly after the first signs of a security breach to effectively reduce the duration and impact of a breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Analyst advice for IT security leaders
sponsored by IBM
WHITE PAPER: Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.
Posted: 14 Nov 2013 | Published: 31 Mar 2013

IBM

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro

Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn
sponsored by Symantec Corporation
WHITE PAPER: Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

Symantec Corporation

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Data Loss Prevention Requirements Roadmap
sponsored by CA Technologies.
WHITE PAPER: The technologies that aid a successful company in sharing digital information and maintaining swift communications also leave companies vulnerable to a variety of security risks. Read this paper to learn how a comprehensive data loss prevention solution can protect your company's sensitive data.
Posted: 02 Mar 2010 | Published: 14 Apr 2009

CA Technologies.

The Future of Authentication for Online Services
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks.
Posted: 02 Nov 2009 | Published: 02 Nov 2009

SafeNet, Inc.

Implementing an Effective Data Loss Prevention Solution for Your Network
sponsored by IBM
WHITE PAPER: Read this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.
Posted: 27 Oct 2009 | Published: 25 Jul 2009

IBM

Seven Best Practices for Managing Software Intellectual Property in an Open Source World
sponsored by Black Duck Software
WHITE PAPER: Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software. This report describes a set of seven best practices whose objective is to encourage development based on component re-use and software assembly.
Posted: 07 Oct 2009 | Published: 07 Oct 2009

Black Duck Software

Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER: This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
Posted: 03 Sep 2009 | Published: 10 Aug 2009

Symantec Corporation

Unraveling Web Malware
sponsored by FireEye
WHITE PAPER: There has been a rapid rise in the use of web blended threats. Defending corporate networks from these threats requires modern protection that functions on many levels. Find out how cyber criminals infiltrate your network and how FireEye's blended defense against Web malware prevents data loss and intellectual property theft.
Posted: 01 Sep 2009 | Published: 29 Sep 2008

FireEye

Top Benefits of Symantec Protection Suite
sponsored by Symantec Corporation
WHITE PAPER: Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Symantec Corporation

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008
sponsored by Microsoft
WHITE PAPER: This document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

Microsoft

CA and VMware: Working Together to Maximize Business Value of Your IT Investments
sponsored by CA Technologies.
WHITE PAPER: The powerful combination of VMware-CA technology and management functions brings you rapid-time-to-value solutions that optimize the utility of your assets and improve your ROI while minimizing your business and IT risks.
Posted: 31 Oct 2008 | Published: 30 Oct 2008

CA Technologies.

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow
sponsored by Sendmail, Inc.
WHITE PAPER: This white paper examines the architecture limitations prevalent in today's large-enterprise email networks.
Posted: 22 Oct 2008 | Published: 22 Oct 2008

Sendmail, Inc.

Software Compliance Management: Automating License Compliance in the New, Mixed-IP Development World
sponsored by Black Duck Software
WHITE PAPER: Software compliance management systems help ensure enterprises achieve the business acceleration they want from software reuse, while meeting the stringent requirements of shareholders, regulators and customers for proper management of company.
Posted: 13 Oct 2008 | Published: 01 Jul 2008

Black Duck Software

Best Practices for Managing Software Intellectual Property
sponsored by Black Duck Software
WHITE PAPER: This paper describes the approaches for managing intellectual property during component-based software development, detailing the seven best practices an organization should adhere by to facilitate the successful management of software IP.
Posted: 13 Oct 2008 | Published: 01 Jun 2007

Black Duck Software

Protecting Essential Information: Securing the Foundation of the Internet Business Platform
sponsored by Websense, Inc.
WHITE PAPER: Today's threats use Web 2.0 to integrate daily operations which has changed the requirements for web security, email security and data loss prevention. Download this white paper to learn more.
Posted: 31 Jul 2008 | Published: 01 Jul 2008

Websense, Inc.
1 - 25 of 34 Matches Previous Page    1 2    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement