Search Results for: Property-

10 Steps to Managing Risk and Regulatory Compliance in Blogs and Wikis
Risks related to collaboration tools like blogs and wikis can create legal liability and regulatory problems. Learn how to gain competitive advantage from these community-building tools while ensuring the content in them is appropriate and secure.

Techrigy

Why Lendlease is embracing digital twin technology
Find out how Australia-based property developer Lendlease is using digital twins, data analytics and automation to break the bulwark of rising costs and declining productivity in the construction sector.

TechTarget ComputerWeekly.com

The Trouble Heading for Your Business 2013
This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.

Trend Micro

Presentation Transcript: Changing Authentication Options
Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.

ActivIdentity Corporation

Presentation Transcript: Risk Mitigation – Bang for the Buck
Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology.

ActivIdentity Corporation

MicroScope June 2014
We investigate the current state of the independent software vendor market and the measures being taken to protect intellectual property and reveal the ACEs winners

MicroScope

Need all that speed?
'Storage' magazine examines nonvolatile memory express and the future of flash storage. We also look at combating ransomware and intellectual property theft.

TechTarget Storage

IBM Rational Asset Manager e-Kit
Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture.

IBM

E-Book: Strategic guide to insider threat detection and breach response
Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.

TechTarget Security

Are You Securely Delivering Enterprise Data and Services?
Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.

OpenText Security Solutions