• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

property

Results 126 - 150 of 150Sort Results By: Published Date | Title | Company Name
By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
By: Alt-N Technologies     Published Date: Sep 26, 2008
Email has become today's most mission-critical communication channel. Each and every day, 800 million business users worldwide use email during the course of their work day and about 80 percent of a company's intellectual property passes though its email server. Email is a vital component of both internal communication between employees and external communication with customers and business partners. It has become such an integral part of normal day-to-day business operations that most companies simply cannot function without it: when email stops, your ability to conduct business also stops.
Tags : 
alt-n technologies, email, exchange server, mdaemon, smtp, pop, imap, syncml
    
Alt-N Technologies
By: BrandProtect     Published Date: Feb 17, 2011
Understanding the Value of a Social Media Risk Management Program
Tags : 
social media monitoring, social media risk management, identity theft, brand and intellectual property abuses, malicious discussion, identity management, internet security
    
BrandProtect
By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting
    
Arbor Networks
By: Sage     Published Date: Aug 19, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage
By: Rovi     Published Date: Feb 07, 2013
By understanding the three key IP management concepts outlined in this paper, CEO’s can lead their teams to achieve profound business results.
Tags : 
intellectual property, knowledge management, ceo, strategy, r&d, innovation, development
    
Rovi
By: HireRight     Published Date: May 01, 2013
A person’s home is their castle, and no one would willingly welcome in a dangerous criminal. If you offer in-home services, your customers trust you to send someone that is not a threat to their family or personal property. If you fail to do so, there can be serious business , financial and even legal consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
field employees, screening, hireright, human resources, in home services screening, human resource technology
    
HireRight
By: Dell SecureWorks     Published Date: May 28, 2013
Advanced Persistent Threats (APT) are a serious concern in today’s threat landscape. They represent a threat to an organization’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government suppliers, thereby threatening the victim country’s national mission.
Tags : 
security
    
Dell SecureWorks
By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property
Tags : 
    
Cisco
By: LogRhythm     Published Date: Dec 20, 2016
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion.i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well.
Tags : 
    
LogRhythm
By: LogRhythm     Published Date: Jun 19, 2018
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well. The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67
Tags : 
hack, malware, intellectual, property, compliance
    
LogRhythm
By: CrowdStrike     Published Date: Aug 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.Download the white paper to:?Learn how a proactive hunting strategy protects valuable data assets from a potential mega breach?Get a detailed analysis of how highly skilled human hunters pair with technology to aggressively seek out threat behaviors?Understand why integrating CrowdStrike Falcon Overwatch into an organization’s existing security resources offers the most comprehensive protection against persistent and skilled adversaries?Fi
Tags : 
    
CrowdStrike
By: Fujitsu     Published Date: Feb 01, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. Devices such as computers and tablets make these tactics possible. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel inside, powerful productivity outside.
Tags : 
technology, mobile, safety, security, tablet, solutions, fujitsu
    
Fujitsu
By: Sparton Corporation     Published Date: Oct 30, 2017
When it comes to Design for Manufacturing (DFM), it’s never too early to start. Planning ahead and thinking through the entire product lifecycle is the best way to reap all the benefits that come from excellent design — including better part selection, improved product quality, streamlined approvals and cost savings. Start by identifying an experienced Countract Manufacturer (CM) that understands the importance of good DFM and who will work with the product developer at every step.
Tags : 
product, market, design, intellectual property, sparton, manufacturing
    
Sparton Corporation
By: Oracle Security Solutions     Published Date: Oct 16, 2017
Leveraging cloud technology enables your enterprise to be more agile and competitive while significantly reducing costs. However, there are risks associated with these benefits. Getting new capabilities quickly is worth far less if it means exposing vulnerabilities that result in regulatory compliance violations and fees, loss of intellectual property (IP), loss of customer data, or damage to your reputation, brand, and future business.
Tags : 
    
Oracle Security Solutions
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
By: RSM US     Published Date: Dec 20, 2017
There is an increasing demand for finance and accounting outsourcing (FAO) among middle market companies, as organizations become more comfortable with the solution. FAO helps companies enhance the efficiency and effectiveness of the finance and accounting function through process and technology improvements, enabling internal employees to focus on the core business. RSM US LLP’s FAO platform goes beyond out-of-the-box functionality within technology solutions, integrating additional intellectual property, including workflows, business processes and organizational frameworks. By leveraging this comprehensive platform, our FAO team can help middle market companies overcome a myriad of finance and accounting challenges. These include hiring, training and developing staff, and most importantly producing actionable finance and accounting information in a timely manner to make critical business decisions.
Tags : 
    
RSM US
By: Group M_IBM Q418     Published Date: Oct 04, 2018
IBM Cloud Migration Services provides migration and modernization of your workloads and applications from anywhere to anywhere. It accelerates your journey to cloud through proven processes, tools and intellectual property. IBM uses automated and optimized patterns in the Cloud Migration Services to deliver cloud ROI faster and increases your opportunity for success.
Tags : 
    
Group M_IBM Q418
By: Darktrace     Published Date: Jun 17, 2019
Trek is one of the world’s largest bicycle companies, producing more bikes in the United States each year than any other company. As a leading manufacturer of high-quality bicycle components and technologies, Trek considers the protection of its intellectual property and designs of paramount importance.
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 21, 2019
Trek is one of the world’s largest bicycle companies, producing more bikes in the United States each year than any other company. As a leading manufacturer of high-quality bicycle components and technologies, Trek considers the protection of its intellectual property and designs of paramount importance.
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 17, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 21, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 17, 2019
Darktrace’s Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. “As a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data,” said Dane Sandersen, Global Security Director at Trek. “Darktrace’s Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today’s sophisticated attacks.”
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 17, 2019
The modern technology sector is uniquely defined by transformative ideas. As a consequence, today’s tech companies invest enormous resources in both material and human capital to foster such ideas, with the recognition that its success ultimately hinges on its intellectual property.
Tags : 
    
Darktrace
By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
    
Darktrace
Start   Previous    1 2 3 4 5 6     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter