Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >  

Intellectual Property

RSS Feed   
DEFINITION: Property that derives from the work of the mind or intellect, specifically, an idea, invention, trade secret, process, program, data, formula, patent, copyright, or trademark or application, right, or registration.
Intellectual Property Reports
1 - 25 of 33 Matches Previous Page  |  Next Page
Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Targeted attacks and how to defend against them
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

ComputerWeekly.com

Beyond Big Data – The New Information Economy
sponsored by ComputerWeekly.com
ANALYST REPORT: How information is managed is more important than 'big data', say analysts Clive Longbottom and Rob Bamforth.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Negotiating cloud contracts
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated.
Posted: 24 Jan 2013 | Published: 24 Jan 2013

ComputerWeekly.com

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

The Future of Innovation Management: The Next 10 Years
sponsored by ComputerWeekly.com
IT BRIEFING: Download this report from Arthur D Little to learn 5 key innovation concepts for CIOs and CTOs.
Posted: 31 Jan 2012 | Published: 05 Sep 2011

ComputerWeekly.com

How to create an effective data protection strategy for IT compliance
sponsored by SearchSecurity.com
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

SearchSecurity.com

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Analyst advice for IT security leaders
sponsored by IBM
WHITE PAPER: Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.
Posted: 14 Nov 2013 | Published: 31 Mar 2013

IBM

Storage Magazine: How to improve your virtual server storage setups
sponsored by IBM.
EZINE: In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.
Posted: 26 Aug 2013 | Published: 28 May 2013

IBM.

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by IBM
EGUIDE: In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn
sponsored by Symantec Corporation
WHITE PAPER: Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

Symantec Corporation

Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER: Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

Innovatum, Inc.

Implementing an Effective Data Loss Prevention Solution for Your Network
sponsored by IBM
WHITE PAPER: Read this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.
Posted: 27 Oct 2009 | Published: 25 Jul 2009

IBM

Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER: This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
Posted: 03 Sep 2009 | Published: 10 Aug 2009

Symantec Corporation

Top Benefits of Symantec Protection Suite
sponsored by Symantec Corporation
WHITE PAPER: Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Symantec Corporation

IBM Rational Asset Manager e-Kit
sponsored by IBM
PRODUCT DEMO: Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture.
Posted: 16 Mar 2009 | Premiered: 13 Mar 2009

IBM

Collaboration solutions: Solutions for small and medium business
sponsored by IBM
RESOURCE CENTER: Check out this IBM resource center to identify collaboration software solutions specifically geared towards small and medium-sized businesses.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Managing the Entire Database Security & Compliance Lifecycle
sponsored by Guardium, an IBM Company
DATA SHEET: Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle.
Posted: 12 Feb 2009 | Published: 12 Feb 2010

Guardium, an IBM Company

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Dell ProSupport Certified Data Destruction
sponsored by DellEMC and Intel®
DATA SHEET: The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

DellEMC and Intel®
1 - 25 of 33 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement