Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >  

Intellectual Property

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Property that derives from the work of the mind or intellect, specifically, an idea, invention, trade secret, process, program, data, formula, patent, copyright, or trademark or application, right, or registration.
Intellectual PropertyReports
1 - 25 of 46 Matches Previous Page  | Next Page
IT Cost Savings with Information Governance - Gartner Research
sponsored by IBM
WHITE PAPER: In this Gartner analysis, find out how Cisco transitioned from an underperforming records management system to an information governance strategy. Discover the benefits they experienced from this switch, and best practices to help you make your own move to information governance.
Posted: 13 Dec 2013 | Published: 17 Apr 2012

IBM

Secure The Enterprise With Confidence Using A Mainframe Infrastructure
sponsored by IBM
WHITE PAPER: Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.
Posted: 14 Nov 2013 | Published: 31 Mar 2013

IBM

Targeted attacks and how to defend against them
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

Three Critical Decisions You Need to Make at the First Sign of a Security Breach
sponsored by Dell SecureWorks UK
WHITE PAPER: Uncover three critical questions you should be prepared to answer quickly after the first signs of a security breach to effectively reduce the duration and impact of a breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks UK

Strategy Deep Dive: Define Your Data
sponsored by TITUS
ANALYST REPORT: In this Forrester report, find insight to help you rethink your strategy for defining and classifying data in order to boost your data defenses. Learn how you can more effectively secure your information by reading on now.
Posted: 17 May 2013 | Published: 05 Apr 2013

TITUS

Beyond Big Data – The New Information Economy
sponsored by ComputerWeekly.com
ANALYST REPORT: How information is managed is more important than 'big data', say analysts Clive Longbottom and Rob Bamforth.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Negotiating cloud contracts
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated.
Posted: 24 Jan 2013 | Published: 24 Jan 2013

ComputerWeekly.com

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

The Future of Innovation Management: The Next 10 Years
sponsored by ComputerWeekly.com
IT BRIEFING: Download this report from Arthur D Little to learn 5 key innovation concepts for CIOs and CTOs.
Posted: 31 Jan 2012 | Published: 05 Sep 2011

ComputerWeekly.com

Storage Magazine: How to improve your virtual server storage setups
sponsored by IBM.
EZINE: In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.
Posted: 26 Aug 2013 | Published: 28 May 2013

IBM.

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro

How to create an effective data protection strategy for IT compliance
sponsored by IBM
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

IBM

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by IBM
EGUIDE: In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn
sponsored by Symantec Corporation
WHITE PAPER: Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

Symantec Corporation

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Data Loss Prevention Requirements Roadmap
sponsored by CA Technologies.
WHITE PAPER: The technologies that aid a successful company in sharing digital information and maintaining swift communications also leave companies vulnerable to a variety of security risks. Read this paper to learn how a comprehensive data loss prevention solution can protect your company's sensitive data.
Posted: 02 Mar 2010 | Published: 14 Apr 2009

CA Technologies.

The Future of Authentication for Online Services
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks.
Posted: 02 Nov 2009 | Published: 02 Nov 2009

SafeNet, Inc.

Implementing an Effective Data Loss Prevention Solution for Your Network
sponsored by IBM
WHITE PAPER: Read this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.
Posted: 27 Oct 2009 | Published: 25 Jul 2009

IBM

Data Breaches in the US
sponsored by Quantum Corporation
ASSESSMENT TOOL: Learn the specifics of how, what and when data breaches occur in the United States by viewing this sales tool. Discover how much data was compromised by lost backup tapes, computer theft and lockbox theft from various organizations like health insurance companies, banks and federal departments.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation

Seven Best Practices for Managing Software Intellectual Property in an Open Source World
sponsored by Black Duck Software
WHITE PAPER: Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software. This report describes a set of seven best practices whose objective is to encourage development based on component re-use and software assembly.
Posted: 07 Oct 2009 | Published: 07 Oct 2009

Black Duck Software

Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER: This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
Posted: 03 Sep 2009 | Published: 10 Aug 2009

Symantec Corporation

Unraveling Web Malware
sponsored by FireEye
WHITE PAPER: There has been a rapid rise in the use of web blended threats. Defending corporate networks from these threats requires modern protection that functions on many levels. Find out how cyber criminals infiltrate your network and how FireEye's blended defense against Web malware prevents data loss and intellectual property theft.
Posted: 01 Sep 2009 | Published: 29 Sep 2008

FireEye

Top Benefits of Symantec Protection Suite
sponsored by Symantec Corporation
WHITE PAPER: Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Symantec Corporation

IBM Rational Asset Manager e-Kit
sponsored by IBM
PRODUCT DEMO: Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture.
Posted: 16 Mar 2009 | Premiered: 13 Mar 2009

IBM
1 - 25 of 46 Matches Previous Page    1 2    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement