digital rights management

Results 1 - 11 of 11Sort Results By: Published Date | Title | Company Name
By: Limelight     Published Date: Feb 16, 2018

Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.

Tags : content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security
    
By: Limelight     Published Date: Feb 16, 2018

DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?

Tags : content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security
    
By: Limelight     Published Date: Feb 16, 2018

People today expect to have a compelling, interactive, and engaging digital experience. Few companies can exist without a website. In a lot of cases, the Internet is the main stream for their customers to gather information, and the performance of their website directly affects their business. So, what measures can companies take to prevent site delays and improve performance? This white paper will explain the mechanism of a CDN and points to consider when selecting a CDN service.

Tags : content delivery network, cdn, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery
    
By: Brainloop     Published Date: Oct 25, 2011

External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.

Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection
    
By: Brainloop     Published Date: Nov 03, 2011

Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!

Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection
    
By: LockLizard     Published Date: Dec 08, 2008

This paper covers why encryption is not enough to protect your electronic documents and why other factors such as the implementation of a DRM (digital rights management) system are equally important for document protection.  It covers key management, enforcing time limitations, and other methods of document control.

Tags : digital rights management, locklizard, key management, time limitations enforcement, security, it management, knowledge management, enterprise applications
    
By: LockLizard     Published Date: Dec 08, 2008

This white paper describes the differences between information, IPR and trade secrets, and where these might apply. 

Tags : ipr/drm protection, locklizard, drm controls, digital rights management, security, security management
    
By: LockLizard     Published Date: Dec 08, 2008

This paper explains what components make up a document security solution and which one is right for you.  It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.

Tags : locklizard, document security, encryption, copy protection, digital rights management, document collaboration, security, application security
    
By: SAP     Published Date: Apr 14, 2011

Discover how publishers, newspapers, studios, and broadcasting companies are using SAP solutions to automate the processes involved in acquisition and exploitation of content assets. They can accurately capture rights and effectively manage royalty processing for higher profits and better relationships.

Tags : intellectual property, contract management, rights availability, visibility, digital media content, rights management, content, royalties
    
By: Neustar Inc.     Published Date: Oct 14, 2013

As the digital universe evolves in both volume and scope, companies must be diligent about protecting their content. Fortunately, companies can easily leverage IP information to protect themselves. This paper explores the best practices of using IP intelligence for digital rights management to reduce risk to online content.

Tags : digital rights management, ip intelligence, best practices, neutar, security, wireless security, online content, rights
    
By: Foxit     Published Date: Sep 18, 2014

This white paper will focus on a solution to create, collaborate, edit, and secure PDF documents.

Tags : foxit, pdf documents, hardcopy documents, softcopy, document archiving, document creation, digital rights management, information rights management