ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intellectual PropertyResearch

  • Tactics to combat insider threat

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.

  • The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    Sponsored by: Neustar®

    This white paper reveals valuable insights into the impact of DDoS smokescreening based on a survey of 440 North American companies.

  • An Inside Track on Insider Threats

    Sponsored by: Imperva

    Read this informative report for details on the impact of insider threats, as well as recommended strategies for businesses to apply in preventing and remediating these critical issues.

  • Automating Information Governance - assuring compliance

    Sponsored by: ComputerWeekly.com

    This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Analyst advice for IT security leaders

    Sponsored by: IBM

    Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.

  • Targeted attacks and how to defend against them

    Sponsored by: ComputerWeekly.com

    Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them.

  • Three Critical Decisions You Need to Make at the First Sign of a Security Breach

    Sponsored by: Dell SecureWorks UK

    Uncover three critical questions you should be prepared to answer quickly after the first signs of a security breach to effectively reduce the duration and impact of a breach.

  • Beyond Big Data – The New Information Economy

    Sponsored by: ComputerWeekly.com

    How information is managed is more important than 'big data', say analysts Clive Longbottom and Rob Bamforth.

  • Five DLP Tips From Security Executives

    Sponsored by: Symantec Corporation

    This whitepaper explores how data loss prevention (DLP) programs impact the effectiveness of security executives and corporate data protection. Topics covered include the dangers of exposed data, the direct benefits of DLP programs, and tips for deploying DLP programs.

  • What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk

    Sponsored by: Symantec Corporation

    Intellectual property theft can often be attributed to employees – whether intentional or not. This whitepaper explores the mindset employees have about taking corporate assets and provides recommendations that will help you minimize the risk.

  • Negotiating cloud contracts

    Sponsored by: ComputerWeekly.com

    This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated.

  • The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment

    Sponsored by: ComputerWeekly.com

    This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.

  • The Future of Innovation Management: The Next 10 Years

    Sponsored by: ComputerWeekly.com

    Download this report from Arthur D Little to learn 5 key innovation concepts for CIOs and CTOs.

  • How to create an effective data protection strategy for IT compliance

    Sponsored by: SearchSecurity.com

    Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.

  • Storage Magazine: How to improve your virtual server storage setups

    Sponsored by: IBM.

    In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.

  • Solitarie Interglobal: Tracked, Hacked and Attacked

    Sponsored by: IBM.

    Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.

  • The Trouble Heading for Your Business 2013

    Sponsored by: Trend Micro

    This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.

  • E-Guide: Monitoring Strategies for Insider Threat Detection

    Sponsored by: IBM

    In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.

  • Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn

    Sponsored by: Symantec Corporation

    Many organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.

  • Data Loss Prevention for IBM i

    Sponsored by: Innovatum, Inc.

    Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.

  • Data Loss Prevention Requirements Roadmap

    Sponsored by: CA Technologies.

    The technologies that aid a successful company in sharing digital information and maintaining swift communications also leave companies vulnerable to a variety of security risks. Read this paper to learn how a comprehensive data loss prevention solution can protect your company's sensitive data.

  • The Future of Authentication for Online Services

    Sponsored by: SafeNet, Inc.

    In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks.

  • Implementing an Effective Data Loss Prevention Solution for Your Network

    Sponsored by: IBM

    Read this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.

  • Data Breaches in the US

    Sponsored by: Quantum Corporation

    Learn the specifics of how, what and when data breaches occur in the United States by viewing this sales tool. Discover how much data was compromised by lost backup tapes, computer theft and lockbox theft from various organizations like health insurance companies, banks and federal departments.

  • Seven Best Practices for Managing Software Intellectual Property in an Open Source World

    Sponsored by: Black Duck Software

    Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software. This report describes a set of seven best practices whose objective is to encourage development based on component re-use and software assembly.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.