SlideShare a Scribd company logo
Brand Threat Analytics Pvt. Ltd. 1
Digital solutions for digital problems
A Panel discussion
A panel discussion with industry leaders on the tools and
technologies that they use in order to fight the rapidly growing online
infringement and to protect their business and brands.
30th April 2021 | 3:00 PM – 4:00 PM
2
www.LdotR.red
Housekeeping
This panel discussion is scheduled for 60 min
with 20 min for Q&A
Please put your questions in the chat window
If you would like to ask a question yourself, please
raise your hand.
The presentation and the recording of the panel
discussion will be made available in the following
week
Brand Threat Analytics Pvt. Ltd. 3
www.LdotR.red
LdotR
We are an Indian online brand protection
company, helping businesses protect their brands
from online threats and infringements across all
digital channels and platforms.
Brand Threat Analytics Pvt. Ltd. 4
www.LdotR.red
Services
Brand Threat Analytics Pvt. Ltd. 5
Nullify Infringements
Using techno-legal solutions rapidly
neutralize infringements
Identify Infringements
Scan the internet to find brand
infringements proactively
Acquire the right digital assets to
protect your brand
Prevent Infringements
www.LdotR.red
Prevent infringements
Brand Threat Analytics Pvt. Ltd. 6
Acquire the right digital assets to
protect your brand
Prevent Infringements
Trademark Clearing House
Digital Asset Management & Acquisition
Corporate Domain Registration & Management
Domain Block Service
Social Media handle acquisition
New brand name assessment
www.LdotR.red
Identify infringements
Brand Threat Analytics Pvt. Ltd. 7
Fraudulent domains and websites (e.g. sb1online.com)
Fake pages/profiles across social media platforms
Counterfeit products on e-commerce websites
Fraudulent app on the app stores
Fake content on websites
Identify Infringements
Scan the internet to find brand
infringements proactively
www.LdotR.red
Nullify infringements
Brand Threat Analytics Pvt. Ltd. 8
Using techno-legal solutions rapidly
neutralize infringements
Nullify Infringements
Shutdown website and suspend domain names
Take down social media content –
pages/profiles/posts/pictures/videos
Takedown counterfeit products and sellers on e-commerce
platforms
Suspend app from app stores
www.LdotR.red
Panelists
Brand Threat Analytics Pvt. Ltd. 9
Panduranga Acharya
Director, Legal
Swiggy
www.LdotR.red
Panelists
Brand Threat Analytics Pvt. Ltd. 10
Smriti Subramanian
General Counsel
Snapdeal
www.LdotR.red
Panelists
Brand Threat Analytics Pvt. Ltd. 11
Stuart Fuller
Global Digital and Brand Ex-CentralNIC
Thank you
connect@ldotr.red
Brand Threat Analytics Pvt. Ltd. 12

More Related Content

What's hot

Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
ForgeRock
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
OneLogin
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
Rasool Irfan
 
Indian Army Decides To Ban 89 Apps For Its Personnel: Here Is The List
Indian Army Decides To Ban 89 Apps For Its Personnel: Here Is The ListIndian Army Decides To Ban 89 Apps For Its Personnel: Here Is The List
Indian Army Decides To Ban 89 Apps For Its Personnel: Here Is The List
Khushboo Chaturvedi
 
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Uniphore
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Ping Identity
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
Ping Identity
 
Digital workplace security for gen z
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen z
Rasool Irfan
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systems
tom12thomas
 
Facial recognition__systems[1]
Facial  recognition__systems[1]Facial  recognition__systems[1]
Facial recognition__systems[1]
christeenamoses
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
ClubHack
 

What's hot (12)

Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
Indian Army Decides To Ban 89 Apps For Its Personnel: Here Is The List
Indian Army Decides To Ban 89 Apps For Its Personnel: Here Is The ListIndian Army Decides To Ban 89 Apps For Its Personnel: Here Is The List
Indian Army Decides To Ban 89 Apps For Its Personnel: Here Is The List
 
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
Why Speech Recognition Technology is the New Watchword for Enterprise Cyber S...
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
Digital workplace security for gen z
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen z
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Facial recognition systems
Facial  recognition  systemsFacial  recognition  systems
Facial recognition systems
 
Facial recognition__systems[1]
Facial  recognition__systems[1]Facial  recognition__systems[1]
Facial recognition__systems[1]
 
Cyber Insurance
Cyber InsuranceCyber Insurance
Cyber Insurance
 

Similar to LdotR - Panel Discussion - Digital Solutions for Digital Problems

techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
seotechinator
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurity
ArjitDas2
 
How to analyze text data with Named Entity Recognition
How to analyze text data with Named Entity RecognitionHow to analyze text data with Named Entity Recognition
How to analyze text data with Named Entity Recognition
Skyl.ai
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
Abhinav Mishra
 
Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data Security
Distil Networks
 
5 .ICV kongres controllera 2017 - PUBLICIS ONE (Branislav Lončar)
5 .ICV kongres controllera 2017 - PUBLICIS ONE (Branislav Lončar)5 .ICV kongres controllera 2017 - PUBLICIS ONE (Branislav Lončar)
5 .ICV kongres controllera 2017 - PUBLICIS ONE (Branislav Lončar)
Menadžment Centar Beograd
 
The Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesThe Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing Companies
Pavan Kumar
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Black Duck by Synopsys
 
Solving the dilemma should you build or buy ai
Solving the dilemma  should you build or buy aiSolving the dilemma  should you build or buy ai
Solving the dilemma should you build or buy ai
Skyl.ai
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
Insights success media and technology pvt ltd
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
Nithin Raj
 
How AI and Machine Learning can Transform Organizations
How AI and Machine Learning can Transform OrganizationsHow AI and Machine Learning can Transform Organizations
How AI and Machine Learning can Transform Organizations
Skyl.ai
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Enterprise Management Associates
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
G3 Communications
 
NetAlter Presentation
NetAlter PresentationNetAlter Presentation
NetAlter Presentation
guestd590ec
 
AI as the Gateway to your Business - Alexander De Ridder, DE RIDDER INTERNAT...
 AI as the Gateway to your Business - Alexander De Ridder, DE RIDDER INTERNAT... AI as the Gateway to your Business - Alexander De Ridder, DE RIDDER INTERNAT...
AI as the Gateway to your Business - Alexander De Ridder, DE RIDDER INTERNAT...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
Stephanie Vanroelen
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
CIO Look Magazine
 

Similar to LdotR - Panel Discussion - Digital Solutions for Digital Problems (20)

techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurity
 
How to analyze text data with Named Entity Recognition
How to analyze text data with Named Entity RecognitionHow to analyze text data with Named Entity Recognition
How to analyze text data with Named Entity Recognition
 
Online Copyright Protection
Online Copyright ProtectionOnline Copyright Protection
Online Copyright Protection
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
Ensuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data SecurityEnsuring Property Portal Listing Data Security
Ensuring Property Portal Listing Data Security
 
5 .ICV kongres controllera 2017 - PUBLICIS ONE (Branislav Lončar)
5 .ICV kongres controllera 2017 - PUBLICIS ONE (Branislav Lončar)5 .ICV kongres controllera 2017 - PUBLICIS ONE (Branislav Lončar)
5 .ICV kongres controllera 2017 - PUBLICIS ONE (Branislav Lončar)
 
The Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesThe Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing Companies
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 
Solving the dilemma should you build or buy ai
Solving the dilemma  should you build or buy aiSolving the dilemma  should you build or buy ai
Solving the dilemma should you build or buy ai
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
How AI and Machine Learning can Transform Organizations
How AI and Machine Learning can Transform OrganizationsHow AI and Machine Learning can Transform Organizations
How AI and Machine Learning can Transform Organizations
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
 
NetAlter Presentation
NetAlter PresentationNetAlter Presentation
NetAlter Presentation
 
AI as the Gateway to your Business - Alexander De Ridder, DE RIDDER INTERNAT...
 AI as the Gateway to your Business - Alexander De Ridder, DE RIDDER INTERNAT... AI as the Gateway to your Business - Alexander De Ridder, DE RIDDER INTERNAT...
AI as the Gateway to your Business - Alexander De Ridder, DE RIDDER INTERNAT...
 
Trojan horseofbyod2
Trojan horseofbyod2Trojan horseofbyod2
Trojan horseofbyod2
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 

Recently uploaded

ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
daothibichhang1
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 

Recently uploaded (20)

ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 

LdotR - Panel Discussion - Digital Solutions for Digital Problems

  • 2. Digital solutions for digital problems A Panel discussion A panel discussion with industry leaders on the tools and technologies that they use in order to fight the rapidly growing online infringement and to protect their business and brands. 30th April 2021 | 3:00 PM – 4:00 PM 2
  • 3. www.LdotR.red Housekeeping This panel discussion is scheduled for 60 min with 20 min for Q&A Please put your questions in the chat window If you would like to ask a question yourself, please raise your hand. The presentation and the recording of the panel discussion will be made available in the following week Brand Threat Analytics Pvt. Ltd. 3
  • 4. www.LdotR.red LdotR We are an Indian online brand protection company, helping businesses protect their brands from online threats and infringements across all digital channels and platforms. Brand Threat Analytics Pvt. Ltd. 4
  • 5. www.LdotR.red Services Brand Threat Analytics Pvt. Ltd. 5 Nullify Infringements Using techno-legal solutions rapidly neutralize infringements Identify Infringements Scan the internet to find brand infringements proactively Acquire the right digital assets to protect your brand Prevent Infringements
  • 6. www.LdotR.red Prevent infringements Brand Threat Analytics Pvt. Ltd. 6 Acquire the right digital assets to protect your brand Prevent Infringements Trademark Clearing House Digital Asset Management & Acquisition Corporate Domain Registration & Management Domain Block Service Social Media handle acquisition New brand name assessment
  • 7. www.LdotR.red Identify infringements Brand Threat Analytics Pvt. Ltd. 7 Fraudulent domains and websites (e.g. sb1online.com) Fake pages/profiles across social media platforms Counterfeit products on e-commerce websites Fraudulent app on the app stores Fake content on websites Identify Infringements Scan the internet to find brand infringements proactively
  • 8. www.LdotR.red Nullify infringements Brand Threat Analytics Pvt. Ltd. 8 Using techno-legal solutions rapidly neutralize infringements Nullify Infringements Shutdown website and suspend domain names Take down social media content – pages/profiles/posts/pictures/videos Takedown counterfeit products and sellers on e-commerce platforms Suspend app from app stores
  • 9. www.LdotR.red Panelists Brand Threat Analytics Pvt. Ltd. 9 Panduranga Acharya Director, Legal Swiggy
  • 10. www.LdotR.red Panelists Brand Threat Analytics Pvt. Ltd. 10 Smriti Subramanian General Counsel Snapdeal
  • 11. www.LdotR.red Panelists Brand Threat Analytics Pvt. Ltd. 11 Stuart Fuller Global Digital and Brand Ex-CentralNIC