Portfolio Marketing Manager
Waiting to secure your new products online? Infringers aren't.
We researched the time it takes from product release date to first online counterfeit, and the results are in: There’s no time to waste. New algorithms using historic and anonymized data from clients have revealed that, for well-known enterprises, a typical measure of “Time-to-Counterfeit” is, well, zero. Issues like information leaks, product popularity and low barriers to entry will nearly guarantee your brand falls into the most vulnerable category. If you’re selling a more complex item (think of the latest smartphone or unique computer software), you could buy a few weeks. Maybe. Research delved deeper into a particular brand (whose name... Read More
Former Sr. Product Marketing Manager
Using Piracy Data to Understand Media Demand and Recover Lost Revenue
Media companies around the globe can use piracy data to get visibility into global piracy consumption trends and the most popular file sharing networks. This data can be turned into actionable intelligence to help make smarter decisions regarding the acquisition and distribution of digital content across the globe. Let’s look at how data around timing of infringement are occurring can help TV networks and copyright owners understand media consumption patterns of how, where and when copyrighted material is being used. [caption id="" align="aligncenter" width="643"] (Source: MarkMonitor GDPI data) The number of instances of piracy infringement across cable, commercial broadcast and premium... Read More
Until recently, digital pirates have used both P2P sites and cyberlockers to upload and share pirated content. But as Internet connection speeds have increased, the piracy landscape has changed, and the appearance of streaming content has proliferated. In fact, 38% of online sporting fans are watching live streaming of their favorite events. However, the recent introduction of live streaming apps is further compounding issues surrounding online piracy, as they are quickly gaining popularity with one of these apps hitting a million users in its first ten days of availability. Although these apps have only existed for a few months, they are... Read More
With just over 2.4 million New gTLDs registered, abuse trends are beginning to emerge. Earlier this month we conducted a review of the top 100 most highly-trafficked Web property names across the top 5 most popular new gTLD registries. It is apparent that the abuse we had expected has occurred – just not where we had anticipated. For example, .Wang leads the pack in terms of abusive registrations with 47% of the top 100 Web property names registered to third-parties. For the other top TLDs which include .XYZ, .Berlin, .Club and .Guru – abusive registrations hover around the 30% mark. It... Read More
We are excited to announce the launch of MarkMonitor Brand Protection™ - Mobile Apps. Consumers are flocking to mobile channels to research and make purchases and where consumers go, so do scammers.  With this new offering, brands can detect instances of brand infringement and misuse in popular mobile app marketplaces. By discouraging brand impersonation and false association in mobile channels, companies can reduce customer confusion, reinforce brand trust and protect m-commerce revenues. Why mobile matters: According to Internet Retailer, in 2013 smartphones and tablets made up almost 35 percent of online traffic Internet Retailer also weighed in on sales through mobile... Read More

Search

Follow Us

Get all the latest updates

Subscribe
Get all the latest updates
Interests

Featured Author

Alison Simpson
With more than 13 years’ experience in the domain industry, Alison has managed all aspects of Corporate Domain Managem... More