property

Results 76 - 100 of 150Sort Results By: Published Date | Title | Company Name

2016 Global Corporate Tax Compliance Survey

Published By: Thomson Reuters     Published Date: Feb 09, 2016
Download this report for insights from industry experts on some of the biggest corporate tax shakeups in 2015, as well as key topics to keep in mind in 2016 and what that all means for tax technology.
Tags : 
global tax compliance, corporate tax software, tax technology, thomson reuters onesource, corporate income tax, direct tax, tax provision, transfer pricing, beps, fatca, tax information reporting, global trade management, supply chain management, tax data management, global tax survey, indirect tax, property tax, statutory reporting, trust tax, country-by-country reporting
    
Thomson Reuters

Everything as a Service – Right Down to the Desktop!

Published By: Staples     Published Date: Jun 01, 2017
Device as a service (DaaS) is a complete, constant, and comprehensive service that covers the entire lifecycle of your business devices. While you're the one using it to get your work done, the device itself remains the property of your DaaS provider who maintains it, services, supports, and owns full responsibility for its lifetime performance. DaaS allows you to pay for only what you use. Read this white paper to learn how DaaS can benefit your operations, lower your costs, reduce your stress, and increase your productivity and profitability.
Tags : 
staples business advantage, budgeting, service
    
Staples

Protect your document & intellectual property with Locklizard

Published By: LockLizard     Published Date: Dec 08, 2008
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Tags : 
drm solutions, locklizard, document protection, secure file sharing, security, identity management, internet security, intrusion detection
    
LockLizard

IPR and the Digital Revolution

Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers why intellectual property law is ineffective in protecting the rights of small authors and publishers. It covers intellectual property rights (IPR), licensing controls, copyright, and copyright protection.
Tags : 
intellectual property law, locklizard, intellectual property rights, licensing controls, copyright protection, security, application security, authentication, security management
    
LockLizard

elearning security - the protection of elearning courses from intellectual property theft

Published By: LockLizard     Published Date: Dec 09, 2008
NetMasterClass, as with all advanced elearning providers, have to be able to offer their training courses at any time with total availability – across the Internet.  NetMasterClass have made a significant investment in the development of proprietary training methods and techniques and have already experienced having their IPR stolen and made publicly available.
Tags : 
locklizard, netmasterclass, elearning, security, drm, return on investment, elearning security, protect, online training, elearning, intellectual property theft, enterprise applications
    
LockLizard

Document Security - the protection of confidential information from intellectual property theft

Published By: LockLizard     Published Date: Dec 09, 2008
The Austin Diagnostic Clinic had to protect confidential information contained in their management documents so that it could be made available to physicians who could not make it to management meetings.
Tags : 
pdf security, document security, pdf document security, security, application security, password management, security management
    
LockLizard

Social media and HR—friends or foes?

Published By: Sage     Published Date: Oct 14, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage

Social media and HR--friends or foes?

Published By: Sage     Published Date: Jan 30, 2015
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, interactive customer experience, hr perspective, intellectual property
    
Sage

Why Malicious Cyberactivities Are “The Greatest Transfer of Wealth in Human History"

Published By: McAfee     Published Date: Apr 25, 2014
Estimating the cost of malicious cyberactivities is complicated. But the real issue is how it affects trade, technology, and economic competition. This in-depth report takes a look at the scope of the problem and what factors determine the real cost of cybercrime.
Tags : 
cybercrime, cyberespionage, data loss, intellectual property loss, reputational damage, security costs, commercial espionage, business confidential information, denial of service attacks, pilferage, security, it management
    
McAfee

Intelligence-Led Security: Develop a Concrete Plan

Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance

The Custom Defense: Detect, Analyze, and Respond to Targeted Attacks

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.
Tags : 
custom defense, security threats, enterprise networks, intellectual property, networking, security, it management
    
CDW-Trend Micro

Protect Customer Privacy While Enriching Data Analytics

Published By: AWS     Published Date: Dec 17, 2018
Watch this webinar to learn how Tr?v Insurance Solutions, an insurance agency licensed to sell on-demand property and casualty insurance products, adopted DgSecure on Amazon Web Services (AWS) to anonymize production data to help comply with GDPR and other data privacy regulations. The solution helps Tr?v meet privacy standards while enabling its analytics teams to use data to better serve its clients.
Tags : 
    
AWS

Anatomy of a Hack Disrupted

Published By: LogRhythm     Published Date: Dec 20, 2016
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm

Anatomy of A Hack Disrupted

Published By: LogRhythm     Published Date: Apr 04, 2017
Every year, organizations spend millions of frustrating hours and countless sums of money trying to reverse the damage done by malware attacks. The harm caused by malware can be astronomical, going well beyond intellectual property loss and huge fines levied for non-compliance. In 2014, the cost of malware attacks and resulting breaches was estimated at $491 billion. And these costs include more than just the money spent trying to directly respond to security breaches. Productivity, long-term profitability, and brand reputation are often severely impacted as well.
Tags : 
    
LogRhythm

Digital Transformation 2.0 in Hospitality

Published By: Comcast Business     Published Date: Feb 06, 2019
Hospitality is a customer-focused industry, with a hotel brand’s reputation and ultimate success dependent on the quality of the experience of its guests. It is no surprise then, that digital transformation efforts within the hospitality sector are focused on technologies that improve the guest experience, from check-in to check-out and everything in between. Today’s travelers are digitally savvy, using their smartphones and mobile devices for a multitude of tasks. They expect a high-quality connection throughout the property and the ability to perform certain tasks from the hotel’s app, such as checking in and choosing their own room. They expect in-room entertainment beyond basic cable and in-room digital devices they can use to order food, book a massage or control the lighting, for example.
Tags : 
hospitality, hospitality providers, hotel technology, motel technology, guest experience, pos, digital entertainment, wifi, hospitality technology, network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet, ethernet, unified communication, digital initiative
    
Comcast Business

Email Encryption for InterScan Messaging Hosted Security

Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering, anti spam, anti spyware
    
Trend Micro SaaS

Network and Endpoint Data Leak Prevention: Comprehensive Protection Using a Best-of-Breed Approach

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.

Osterman Research: Why Your Organization Needs to Implement DLP

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.

Data Protection Solutions at Midsize Organizations

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.

Trend Micro LeakProof: Leveraging Data Leak Prevention Technology to Secure Corporate Assets

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.

When Encryption Is Not Enough

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.

Industry Leading Security Strategy – How DocuSign Does It

Published By: DocuSign     Published Date: May 29, 2014
Few business processes are as security sensitive as those involving electronic signatures. eSignature transactions routinely contain information that is critical to you, your business, and your customers. This information may include personally identifiable Information (PII), pricing details, proprietary business terms, intellectual property, and more. That is why DocuSign’s number one priority is customer security. DocuSign leads the industry in designing and delivering the most secure digital transaction solution available.
Tags : 
docusign, security, esignatures, personally identifiable information, pii, customer security, digital transactions, enterprise applications
    
DocuSign

Protecting data in the age of employee churn

Published By: Code42     Published Date: Jan 13, 2016
Whether in search of better managers, higher pay or more recognition, people are changing careers faster than ever. The average tenure of wage and salary employees is 4.6 years. With more and more employees working exclusively with corporate data, higher attrition translates to higher levels of data loss. Many employees feel entitled to the work they’ve created and ignore security policies, simply taking the data they want. While some of this pilfered data is innocuous or already in the public realm, some of it is classified, such as customer and employee information, payment data and intellectual property. Code42 provides enterprise organizations with a way to view, manage and protect data from walking out the door. Download the white paper to learn how.
Tags : 
code42, data protection, payment data, data protection, corporate data security, security, it management, knowledge management, enterprise applications
    
Code42

CapSpecialty Achieves up to 200 Times Faster Reporting with Snowflake

Published By: SnowFlake     Published Date: Jul 08, 2016
CapSpecialty, through its subsidiaries, is a leading provider of specialty insurance for small to mid-sized businesses in the U.S., offering commercial property and casualty, professional liability, surety and fidelity products in all 50 states and the District of Columbia. By working with select partners through a limited distribution model, CapSpecialty’s creative, hardworking team provides personalized service and cultivates mutually successful partnerships to deliver positive results.
Tags : 
snowflake, capspecialty, insurance, best practices, business intelligence, business management, productivity, project management
    
SnowFlake

Managing Intellectual Property: A Total Solution

Published By: SAP     Published Date: Apr 14, 2011
Discover how publishers, newspapers, studios, and broadcasting companies are using SAP solutions to automate the processes involved in acquisition and exploitation of content assets. They can accurately capture rights and effectively manage royalty processing for higher profits and better relationships.
Tags : 
intellectual property, contract management, rights availability, visibility, digital media content, rights management, content, royalties, contact management, records management, secure content management
    
SAP
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.