Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >  

Intellectual Property

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Property that derives from the work of the mind or intellect, specifically, an idea, invention, trade secret, process, program, data, formula, patent, copyright, or trademark or application, right, or registration.
Intellectual PropertyReports
26 - 50 of 59 Matches Previous Page  | Next Page
How to create an effective data protection strategy for IT compliance
sponsored by SearchSecurity.com
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

SearchSecurity.com

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by IBM
EGUIDE: In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn
sponsored by Symantec Corporation
WHITE PAPER: Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

Symantec Corporation

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Data Loss Prevention Requirements Roadmap
sponsored by CA Technologies.
WHITE PAPER: The technologies that aid a successful company in sharing digital information and maintaining swift communications also leave companies vulnerable to a variety of security risks. Read this paper to learn how a comprehensive data loss prevention solution can protect your company's sensitive data.
Posted: 02 Mar 2010 | Published: 14 Apr 2009

CA Technologies.

The Future of Authentication for Online Services
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks.
Posted: 02 Nov 2009 | Published: 02 Nov 2009

SafeNet, Inc.

Implementing an Effective Data Loss Prevention Solution for Your Network
sponsored by IBM
WHITE PAPER: Read this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.
Posted: 27 Oct 2009 | Published: 25 Jul 2009

IBM

Data Breaches in the US
sponsored by Quantum Corporation
ASSESSMENT TOOL: Learn the specifics of how, what and when data breaches occur in the United States by viewing this sales tool. Discover how much data was compromised by lost backup tapes, computer theft and lockbox theft from various organizations like health insurance companies, banks and federal departments.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation

Seven Best Practices for Managing Software Intellectual Property in an Open Source World
sponsored by Black Duck Software
WHITE PAPER: Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software. This report describes a set of seven best practices whose objective is to encourage development based on component re-use and software assembly.
Posted: 07 Oct 2009 | Published: 07 Oct 2009

Black Duck Software

Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER: This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
Posted: 03 Sep 2009 | Published: 10 Aug 2009

Symantec Corporation

Unraveling Web Malware
sponsored by FireEye
WHITE PAPER: There has been a rapid rise in the use of web blended threats. Defending corporate networks from these threats requires modern protection that functions on many levels. Find out how cyber criminals infiltrate your network and how FireEye's blended defense against Web malware prevents data loss and intellectual property theft.
Posted: 01 Sep 2009 | Published: 29 Sep 2008

FireEye

Top Benefits of Symantec Protection Suite
sponsored by Symantec Corporation
WHITE PAPER: Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Symantec Corporation

IBM Rational Asset Manager e-Kit
sponsored by IBM
PRODUCT DEMO: Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture.
Posted: 16 Mar 2009 | Premiered: 13 Mar 2009

IBM

Collaboration solutions: Solutions for small and medium business
sponsored by IBM
RESOURCE CENTER: Check out this IBM resource center to identify collaboration software solutions specifically geared towards small and medium-sized businesses.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Managing the Entire Database Security & Compliance Lifecycle
sponsored by Guardium, an IBM Company
DATA SHEET: Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle.
Posted: 12 Feb 2009 | Published: 12 Feb 2010

Guardium, an IBM Company

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Keep Your Hard Drive
sponsored by Dell, Inc.
DATA SHEET: The Keep Your Hard Drive service puts Dell customers in complete control of their data and hard drive disposal, while preserving all the benefits of the Dell Limited Warranty on Failed Hard Drives.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

Dell, Inc.

Dell ProSupport Certified Data Destruction
sponsored by Dell, Inc.
DATA SHEET: The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

Dell, Inc.

Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008
sponsored by Microsoft
WHITE PAPER: This document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

Microsoft

CA and VMware: Working Together to Maximize Business Value of Your IT Investments
sponsored by CA Technologies.
WHITE PAPER: The powerful combination of VMware-CA technology and management functions brings you rapid-time-to-value solutions that optimize the utility of your assets and improve your ROI while minimizing your business and IT risks.
Posted: 31 Oct 2008 | Published: 30 Oct 2008

CA Technologies.

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow
sponsored by Sendmail, Inc.
WHITE PAPER: This white paper examines the architecture limitations prevalent in today's large-enterprise email networks.
Posted: 22 Oct 2008 | Published: 22 Oct 2008

Sendmail, Inc.

Software Compliance Management: Automating License Compliance in the New, Mixed-IP Development World
sponsored by Black Duck Software
WHITE PAPER: Software compliance management systems help ensure enterprises achieve the business acceleration they want from software reuse, while meeting the stringent requirements of shareholders, regulators and customers for proper management of company.
Posted: 13 Oct 2008 | Published: 01 Jul 2008

Black Duck Software

Best Practices for Managing Software Intellectual Property
sponsored by Black Duck Software
WHITE PAPER: This paper describes the approaches for managing intellectual property during component-based software development, detailing the seven best practices an organization should adhere by to facilitate the successful management of software IP.
Posted: 13 Oct 2008 | Published: 01 Jun 2007

Black Duck Software

Protecting Essential Information: Securing the Foundation of the Internet Business Platform
sponsored by Websense, Inc.
WHITE PAPER: Today's threats use Web 2.0 to integrate daily operations which has changed the requirements for web security, email security and data loss prevention. Download this white paper to learn more.
Posted: 31 Jul 2008 | Published: 01 Jul 2008

Websense, Inc.

China Auto Industry Research - Inside China: The Chinese View Their Automotive Future
sponsored by IBM Line of Business
WHITE PAPER: Automotive manufacturers and suppliers view China as the largest combination of automotive market and low-cost manufacturing and supply base to appear in decades.
Posted: 12 Jun 2008 | Published: 01 Nov 2005

IBM Line of Business
26 - 50 of 59 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement