Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

intellectual property

Results 1 - 25 of 113Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Oct 03, 2019
In part two of the Unified Data Protection for a Hybrid IT World webinar series, we take a deeper dive into use cases around the challenges that businesses are facing today and how Forcepoint’s solutions meet your data protection needs. Understanding the location of all data, whether at-rest, in-use, or in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify their riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data. This webinar explores how companies should rethink data security. Protecting critical data and intellectual property requires a risk-adaptive, dynamic approach, including these three main components. Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate Risk-Adaptive Controls – to eliminate the complexity of policy enforcement Intelligent & Dynamic Automation – to build a better understanding of c
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Oct 02, 2019
If you want greater—and earlier—visibility into indicators of security threats like intellectual property theft, compromised accounts, and insider risk, behavioral analytics may be the answer. Download this Gartner Market Guide if you’re considering or planning to integrate User and Entity Behavior Analytics (UEBA) to augment other security solutions or achieve risk-adaptive protection.
Tags : 
    
Forcepoint
Published By: PatSnap     Published Date: Sep 27, 2019
Out-of-box tools that use AI, machine-learning, and real-time intelligence are driving the commercialization of IP today. However, IP professionals are faced with a dizzying array of offerings on the market. What features are must haves for IP teams in 2019? What processes will streamline the commercialization process? This eBook works as a clear guide in identifying the tools IP teams need to commercialize with confidence, in 4 easy-to-action workflow tips: 1. Confirming patent novelty easily 2. Deciding on ideas that are worth pursuing 3. Collating key data via analysis and patent landscaping faster 4. Mitigating bottlenecks through interdepartmental collaboration
Tags : 
research and development, intellectual property, innovation
    
PatSnap
Published By: PatSnap     Published Date: Sep 27, 2019
IP professionals require the utmost precision, flexibility, and speed in their workflows. However numerous challenges around disparate sources and tools can delay the IP process. This eBook lays out IP best practices online that will streamline various workflows to drive accurate and effective results, effortlessly. These are: 1. Performing more efficient patent searches 2. Unlocking value from patent portfolios 3. Structuring effective patent landscapes 4. Building more revealing reports 5. Mitigating bottlenecks via collaboration
Tags : 
research and development, intellectual property, innovation
    
PatSnap
Published By: PatSnap     Published Date: Sep 27, 2019
R&D and IP can no longer afford to work independently. Current siloed processes in both teams are leading to bottlenecks in the innovation and asset management process across the market, costing companies thousands of dollars monthly. This eBook presents both IP and R&D teams with 9 insider tips to effortlessly facilitate a more symbiotic relationship; translating to better productivity, a breakdown of barriers, better alignment to company goals, and higher returns on investment.
Tags : 
research and development, intellectual property, innovation
    
PatSnap
Published By: Darktrace     Published Date: Jun 21, 2019
Trek is one of the world’s largest bicycle companies, producing more bikes in the United States each year than any other company. As a leading manufacturer of high-quality bicycle components and technologies, Trek considers the protection of its intellectual property and designs of paramount importance.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
Trek is one of the world’s largest bicycle companies, producing more bikes in the United States each year than any other company. As a leading manufacturer of high-quality bicycle components and technologies, Trek considers the protection of its intellectual property and designs of paramount importance.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
Darktrace’s Enterprise Immune System provides Trek with an unprecedented level of visibility into its network and the day-to-day behaviors exhibited by the users and devices within it. Thus, the company has a much improved understanding of its network as a whole. “As a multinational business, it is crucial that we are able to protect the individuality and integrity of our brand, including intellectual property and customer data,” said Dane Sandersen, Global Security Director at Trek. “Darktrace’s Enterprise Immune System has given us peace of mind that we are wellequipped to defend against today’s sophisticated attacks.”
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
The modern technology sector is uniquely defined by transformative ideas. As a consequence, today’s tech companies invest enormous resources in both material and human capital to foster such ideas, with the recognition that its success ultimately hinges on its intellectual property.
Tags : 
    
Darktrace
Published By: Oracle     Published Date: Jun 10, 2019
Yes, you can build better trust in your data —but only if the organization can collect, structure, analyze and protect data in the right ways with the right tools. Modern supply chains integrate a host of related parties (and human error) into knowledge systems, which include business metrics, supplier sustainability performance data, and even intellectual property (IP). This is why systems and data must be built around secure access and verifiable trust. To find out more, download this report today!
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jun 10, 2019
Yes, you can build better trust in your data —but only if the organization can collect, structure, analyze and protect data in the right ways with the right tools. Modern supply chains integrate a host of related parties (and human error) into knowledge systems, which include business metrics, supplier sustainability performance data, and even intellectual property (IP). This is why systems and data must be built around secure access and verifiable trust. To find out more, download this report today!
Tags : 
    
Oracle
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: Oracle     Published Date: Jun 04, 2019
Yes, you can build better trust in your data —but only if the organization can collect, structure, analyze and protect data in the right ways with the right tools. Modern supply chains integrate a host of related parties (and human error) into knowledge systems, which include business metrics, supplier sustainability performance data, and even intellectual property (IP). This is why systems and data must be built around secure access and verifiable trust. To find out more, download this report today!
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jun 04, 2019
Yes, you can build better trust in your data —but only if the organization can collect, structure, analyze and protect data in the right ways with the right tools. Modern supply chains integrate a host of related parties (and human error) into knowledge systems, which include business metrics, supplier sustainability performance data, and even intellectual property (IP). This is why systems and data must be built around secure access and verifiable trust. To find out more, download this report today!
Tags : 
    
Oracle
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Group M_IBM Q2'19     Published Date: Apr 04, 2019
As more companies transform their infrastructures with hybrid cloud services, they require environments that protect the safety of their intellectual property, such as data and business rules. In addition, businesses need a set of hybrid cloud services that provides the best of both worlds: the elasticity and automatic provisioning of the public cloud with the economic viability of the private cloud. Welcome to IBM LinuxONE.
Tags : 
    
Group M_IBM Q2'19
Published By: Sparton Corporation     Published Date: Jan 08, 2019
With the cost of manufacturing in China escalating, companies are increasingly looking to Southeast Asia for an alternative to meet their outsource manufacturing needs. Emerging as the leading alternative to China, Vietnam is now a destination choice for outsource manufacturing due to the unique financial advantages it can provide companies, including those in high-tech segments such as medical and commercial aerospace. In addition to lowering total costs, Vietnam offers companies a larger labor force, strong IP protection, and reliable quality in the manufacturing process, among other benefits. Moving their contract manufacturing to Vietnam can provide companies an excellent foundation for long-term profits and sustained growth.
Tags : 
china, vietnam, southeast asia, manufacturing, cost, outsource, high-tech, commercial aerospace, medical, labor, skilled, foreign, investment, market, supply chain, intellectual property, shipping, logistics
    
Sparton Corporation
Published By: Group M_IBM Q418     Published Date: Oct 04, 2018
IBM Cloud Migration Services provides migration and modernization of your workloads and applications from anywhere to anywhere. It accelerates your journey to cloud through proven processes, tools and intellectual property. IBM uses automated and optimized patterns in the Cloud Migration Services to deliver cloud ROI faster and increases your opportunity for success.
Tags : 
    
Group M_IBM Q418
Published By: SAS     Published Date: Aug 28, 2018
Starting data governance initiatives can seem a bit daunting. You’re establishing strategies and policies for data assets. And, you’re committing the organization to treat data as a corporate asset, on par with its buildings, its supply chain, its employees or its intellectual property. However, as Jill Dyché and Evan Levy have noted, data governance is a combination of strategy and execution. It’s an approach that requires one to be both holistic and pragmatic: • Holistic. All aspects of data usage and maintenance are taken into account in establishing the vision. • Pragmatic. Political challenges and cross-departmental struggles are part of the equation. So, the tactical deployment must be delivered in phases to provide quick “wins” and avert organizational fatigue from a larger, more monolithic exercise. To accomplish this, data governance must touch all internal and external IT systems and establish decision-making mechanisms that transcend organizational silos. And, it must provi
Tags : 
    
SAS
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Published By: LogRhythm     Published Date: Jun 19, 2018
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. i And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well. The malware threat is growing larger and becoming more challenging to respond to every year. It seems like every month there are more major breaches. Target, Neiman Marcus, and UPS have all been victims of costly breaches in the past couple years, with each event showing signs that the breaches could have been prevented. Phishing-based malware was the starting point 95 percent of the time in state-sponsored attacks, and 67
Tags : 
hack, malware, intellectual, property, compliance
    
LogRhythm
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Start   Previous   1 2 3 4 5    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.