Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >  

Intellectual Property

RSS Feed   
DEFINITION: Property that derives from the work of the mind or intellect, specifically, an idea, invention, trade secret, process, program, data, formula, patent, copyright, or trademark or application, right, or registration.
Intellectual Property White Papers (View All Report Types)
18 Matches
What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Analyst advice for IT security leaders
sponsored by IBM
WHITE PAPER: Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.
Posted: 14 Nov 2013 | Published: 31 Mar 2013

IBM

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro

Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn
sponsored by Symantec Corporation
WHITE PAPER: Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

Symantec Corporation

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Implementing an Effective Data Loss Prevention Solution for Your Network
sponsored by IBM
WHITE PAPER: Read this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.
Posted: 27 Oct 2009 | Published: 25 Jul 2009

IBM

Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER: This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
Posted: 03 Sep 2009 | Published: 10 Aug 2009

Symantec Corporation

Top Benefits of Symantec Protection Suite
sponsored by Symantec Corporation
WHITE PAPER: Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Symantec Corporation

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008
sponsored by Microsoft
WHITE PAPER: This document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

Microsoft

Software Compliance Management: Automating License Compliance in the New, Mixed-IP Development World
sponsored by Black Duck Software
WHITE PAPER: Software compliance management systems help ensure enterprises achieve the business acceleration they want from software reuse, while meeting the stringent requirements of shareholders, regulators and customers for proper management of company.
Posted: 13 Oct 2008 | Published: 01 Jul 2008

Black Duck Software

China Auto Industry Research - Inside China: The Chinese View Their Automotive Future
sponsored by IBM Line of Business
WHITE PAPER: Automotive manufacturers and suppliers view China as the largest combination of automotive market and low-cost manufacturing and supply base to appear in decades.
Posted: 12 Jun 2008 | Published: 01 Nov 2005

IBM Line of Business

Global Threat Research Report: Russia
sponsored by VeriSign, Inc
WHITE PAPER: This report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
Posted: 16 Nov 2007 | Published: 10 Jan 2007

VeriSign, Inc

10 Steps to Managing Risk and Regulatory Compliance in Blogs and Wikis
sponsored by Techrigy
WHITE PAPER: Risks related to collaboration tools like blogs and wikis can create legal liability and regulatory problems. Learn how to gain competitive advantage from these community-building tools while ensuring the content in them is appropriate and secure.
Posted: 08 Oct 2007 | Published: 01 Sep 2007

Techrigy

Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
sponsored by Symantec Corporation
WHITE PAPER: This paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
Posted: 03 Aug 2007 | Published: 01 May 2007

Symantec Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation
18 Matches

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement