• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

property

Results 26 - 50 of 148Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Feb 16, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
technology, infrastructure management, security, network management, network performance, best practices, productivity
    
Cisco
By: Group M_IBM Q418     Published Date: Oct 04, 2018
IBM Cloud Migration Services provides migration and modernization of your workloads and applications from anywhere to anywhere. It accelerates your journey to cloud through proven processes, tools and intellectual property. IBM uses automated and optimized patterns in the Cloud Migration Services to deliver cloud ROI faster and increases your opportunity for success.
Tags : 
    
Group M_IBM Q418
By: Symantec     Published Date: Nov 30, 2015
By code signing software, developers can ensure the integrity of their application, protect their intellectual property and brand image and help combat malware.
Tags : 
    
Symantec
By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map, compliance, internet security, intrusion prevention, security management, data protection, secure content management
    
Intralinks
By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security, document security, avalere, information management
    
Avalere
By: 2ergo     Published Date: Apr 09, 2010
When Rightmove wanted to be the first to provide an innovative and engaging mobile app that would move millions of iPhone users to access extensive property search functionality, they turned to 2ergo. Learn about the challenges Rightmove faced, the solution 2ergo provided, and the unbelievable results that were achieved, including how the app ultimately ranked in the top 30 Apple "Best Apps of 2009" chart.
Tags : 
2ergo, iphone, mobile devices, apps, applications, mobile apps, smartphone, gps, property app
    
2ergo
By: Cisco     Published Date: Dec 21, 2016
Located at a hub of innovation, Hyatt Regency Santa Clara caters to sophisticated, technology-savvy guests. This made it the perfect location for Hyatt Hotels to use as a model property in its quest to create the digital hotel of the future. Wi-Fi is one of the most visible services a hotel provides, and is crucial to guest experiences and loyalty. “We had limited Wi-Fi coverage that was not designed for the modern, mobile digital guest,” explains Dania Duke, general manager at Hyatt Regency Santa Clara. “We quickly learned that to stay competitive in Silicon Valley, we need to have the fastest, best Wi-Fi available.”
Tags : 
    
Cisco
By: Bit9     Published Date: Mar 07, 2013
Download Bit9’s latest Threat Advisor and see how a trust-based security platform can help you protect your core IP.
Tags : 
security, risk management, cyber threats, security breaches, cyber espionage, nsa, intellectual property
    
Bit9
By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection, intrusion detection, intrusion prevention, application integration, analytical applications, data protection, database security
    
Verdasys
By: Group M_IBM Q2'19     Published Date: Apr 04, 2019
As more companies transform their infrastructures with hybrid cloud services, they require environments that protect the safety of their intellectual property, such as data and business rules. In addition, businesses need a set of hybrid cloud services that provides the best of both worlds: the elasticity and automatic provisioning of the public cloud with the economic viability of the private cloud. Welcome to IBM LinuxONE.
Tags : 
    
Group M_IBM Q2'19
By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : 
security, it management
    
CarbonBlack
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches. Cyber threats continue to mutate and grow in volume. Read on to learn more.
Tags : 
defeating cyber threats, wider net, arbor networks, network security, improving ability to protect data, data security, security, data management
    
Arbor Networks
By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security, reliability, netscaler, wireless
    
Citrix Systems
By: Citrix Systems     Published Date: Feb 10, 2016
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
    
Citrix Systems
By: Sparton Corporation     Published Date: Oct 30, 2017
When it comes to Design for Manufacturing (DFM), it’s never too early to start. Planning ahead and thinking through the entire product lifecycle is the best way to reap all the benefits that come from excellent design — including better part selection, improved product quality, streamlined approvals and cost savings. Start by identifying an experienced Countract Manufacturer (CM) that understands the importance of good DFM and who will work with the product developer at every step.
Tags : 
product, market, design, intellectual property, sparton, manufacturing
    
Sparton Corporation
By: Sparton Corporation     Published Date: Oct 31, 2017
When it comes to Design for Manufacturing (DFM), it’s never too early to start. Planning ahead and thinking through the entire product lifecycle is the best way to reap all the benefits that come from excellent design — including better part selection, improved product quality, streamlined approvals and cost savings. Start by identifying an experienced Countract Manufacturer (CM) that understands the importance of good DFM and who will work with the product developer at every step.
Tags : 
product, market, design, intellectual property, sparton, manufacturing
    
Sparton Corporation
By: Comcast Business     Published Date: Feb 06, 2019
Hospitality is a customer-focused industry, with a hotel brand’s reputation and ultimate success dependent on the quality of the experience of its guests. It is no surprise then, that digital transformation efforts within the hospitality sector are focused on technologies that improve the guest experience, from check-in to check-out and everything in between. Today’s travelers are digitally savvy, using their smartphones and mobile devices for a multitude of tasks. They expect a high-quality connection throughout the property and the ability to perform certain tasks from the hotel’s app, such as checking in and choosing their own room. They expect in-room entertainment beyond basic cable and in-room digital devices they can use to order food, book a massage or control the lighting, for example.
Tags : 
hospitality, hospitality providers, hotel technology, motel technology, guest experience, pos, digital entertainment, wifi, hospitality technology, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative
    
Comcast Business
By: LockLizard     Published Date: Dec 09, 2008
The Austin Diagnostic Clinic had to protect confidential information contained in their management documents so that it could be made available to physicians who could not make it to management meetings.
Tags : 
pdf security, document security, pdf document security, security, application security, password management, security management
    
LockLizard
By: SambaSaftey     Published Date: Mar 15, 2019
Regardless of the size of the vehicles, and often despite the utmost caution, operating vehicles can be a risky endeavor. According to the National Highway Transportation Safety Administration, highway accidents accounted for 37,461 deaths in the U.S. in 2016.1 Moreover, a recent study by Motus, a vehicle management and reimbursement platform, found that 40% of all motor vehicle accidents are work-related and cost employers a staggering $56.7 billion in 2017, taking into account medical expenses, property damage, increased insurance premiums, and lost productivity.2 While liability insurance is an important way for employers to address that risk, it’s by no means a panacea. Companies can and should be doing more to lessen the likelihood of accidents in the first place. And given that the vast majority (94%, according to NHTSA’s study) stem from driver-related actions or inactions as opposed to equipment malfunctions, one of the most important ways of doing so is to ensure that the in
Tags : 
    
SambaSaftey
By: ClickSoftware     Published Date: Jun 30, 2014
Driving Change of Property and Casualty – Transform Your Customer Experience INSURERS ARE UNDERSTANDABLY EAGER to differentiate customer experience by automating mobile workforce management—especially when they can also cut operational costs, reduce carbon footprint, and streamline catastrophe response in the process. But this profound transformation in the daily lives of field claims and other mobile workers must be managed carefully to maximize benefits while minimizing disruption for all stakeholders.
Tags : 
clicksoftware, mobile, mobile workforce, property & casualty, workforce management
    
ClickSoftware
By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security, application security, email security, encryption, security management, security policies
    
CarbonBlack
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter