loss intellectual property

Results 1 - 13 of 13Sort Results By: Published Date | Title | Company Name
Published By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
    
Verdasys
Published By: Verdasys     Published Date: Mar 28, 2012
In this whitepaper get the answers to the open gaps left in the WikiLeaks story and learn how you can prevent insider threats that are just as detrimental in your organization.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
    
Verdasys
Published By: IBM     Published Date: Oct 26, 2017
Firms face loss of Intellectual property (IP) and breaches of sensitive data as a result of account takeover (ATO). Risk-based authentication RBA plays an important role in the identity and access management (IAM) and risk mitigation of ATO across a variety of user populations (employee-facing [B2E] users, partners, clients, and consumer/citizen-facing users).
Tags : 
risk based authentication, account takeover, intellectual property, sensitive data, identity management
    
IBM
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
Published By: McAfee     Published Date: Apr 25, 2014
Estimating the cost of malicious cyberactivities is complicated. But the real issue is how it affects trade, technology, and economic competition. This in-depth report takes a look at the scope of the problem and what factors determine the real cost of cybercrime.
Tags : 
cybercrime, cyberespionage, data loss, intellectual property loss, reputational damage, security costs, commercial espionage, business confidential information, denial of service attacks, pilferage, security, it management
    
McAfee
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: Code42     Published Date: Jan 13, 2016
Whether in search of better managers, higher pay or more recognition, people are changing careers faster than ever. The average tenure of wage and salary employees is 4.6 years. With more and more employees working exclusively with corporate data, higher attrition translates to higher levels of data loss. Many employees feel entitled to the work they’ve created and ignore security policies, simply taking the data they want. While some of this pilfered data is innocuous or already in the public realm, some of it is classified, such as customer and employee information, payment data and intellectual property. Code42 provides enterprise organizations with a way to view, manage and protect data from walking out the door. Download the white paper to learn how.
Tags : 
code42, data protection, payment data, data protection, corporate data security, security, it management, knowledge management, enterprise applications
    
Code42
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Oracle Security Solutions     Published Date: Oct 16, 2017
Leveraging cloud technology enables your enterprise to be more agile and competitive while significantly reducing costs. However, there are risks associated with these benefits. Getting new capabilities quickly is worth far less if it means exposing vulnerabilities that result in regulatory compliance violations and fees, loss of intellectual property (IP), loss of customer data, or damage to your reputation, brand, and future business.
Tags : 
    
Oracle Security Solutions
Search      

Add Research

Get your company's research in the hands of targeted business professionals.