Protecting Intellectual Property: Best Practices

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • E-discovery management: How IT should interact with the legal team

    Amid the growing important of electronic discovery, it's critical that an organization's IT team strike a good working relationship with its legal team. But this can be un-chartered territory for IT personnel. In this tip, contributor Trent Henry sup... 

  • How to secure an FTP connection

    Network security expert Mike Chapple offers three tips that enable an FTP connection without opening up an enterprise to security risks. 

  • How to prevent software piracy

    Security management pro Mike Rothman discusses several ways organizations can prevent software piracy and protect their intellectual property. 

  • Symantec fills gap with whole disk storage encryption

    Symantec added whole disk and removable storage encryption to its portfolio through a partnership with GuardianEdge, working to strengthen its competitive position. 

  • How to protect DNS servers

    The DNS database is the world's largest distributed database, but unfortunately, DNS was not designed with security in mind. Application security expert Michael Cobb explains how to keep a DNS server from being hijacked. 

  • Data loss prevention (DLP) tools: The new way to prevent identity theft?

    Despite advances in perimeter technologies, data theft has become common in today's enterprises. To protect their confidential information, some security professionals are turning to an emerging technology category: data loss prevention. But don't th... 

  • Is DLP coming of age? Reconnex hopes to ease path

    Firms have grappled with DLP, but after a hard experience, ING's Andre Gold tells why it may be ready for prime time. Meanwhile, Reconnex says its new product can ease the path. 

  • How to lock down USB devices

    USB devices, thumb drives, flash drives -- whatever you call them, portable media present a significant challenge for enterprises, as they enable easier data transport for mobile workers, but are often the cause for catastrophic data leaks. In this t... 

  • Data loss prevention from the inside out

    Corporate information loss can often be credited to a company's internal organization, or lack thereof. In other words, in order to prevent data leakage, corporations must not only eliminate external threats, but also internal processes that could en... 

  • Information protection: Using Windows Rights Management Services to secure data

    Keeping confidential information under wraps is paramount in any business, but finding the right mix of tools or techniques is a common challenge. In this tip, contributor Tony Bradley explains how Windows Rights Management Services (WRMS) can help e...