Ask anything...
Talk to sales now Show me a demo Does Red Points cover Chinese platforms?
What are cousin domain attacks and how to prevent them?

Impersonation Removal6 mins

What are cousin domain attacks and how to prevent them?

A cousin domain attack is a type of phishing attack where a fake website with…

How to recover lost revenue with a counterfeit lawsuit

IP Insights5 mins

How to recover lost revenue with a counterfeit lawsuit

For legal professionals, business executives and decision makers, it is important to know what a…

How can businesses prevent password sharing?

Piracy5 mins

How can businesses prevent password sharing?

Password sharing is one of the biggest industry challenges for subscription-based businesses because of lost…

Everything you should know about typosquatting detection

Impersonation Removal6 mins

Everything you should know about typosquatting detection

In today's digital age, businesses are becoming increasingly reliant on their online presence to reach…

How to take down someone else’s YouTube account: a comprehensive guide

How To's9 mins

How to take down someone else’s YouTube account: a comprehensive guide

At the moment, YouTube is the largest video-sharing platform in the world, one of the…

Navigating intellectual property disputes: what you need to know

IP Insights5 mins

Navigating intellectual property disputes: what you need to know

Protecting intellectual property (IP) assets is key to building a good brand protection strategy in…

Legal remedies for counterfeiting

Brand Protection4 mins

Legal remedies for counterfeiting

In contemporary times, there is global accessibility and interconnectivity through the internet, raising an increased…

The top 5 issues in trade secret litigation and how to address them

IP Insights6 mins

The top 5 issues in trade secret litigation and how to address them

Trade secrets are an essential element of business for companies around the world. Under US…

A comprehensive guide to copyright litigation

IP Insights7 mins

A comprehensive guide to copyright litigation

Copyright is a way to protect your work and prevent others from using it without…

A guide to patent litigation

IP Insights6 mins

A guide to patent litigation

Today, every invention, idea, product, process or service is liable to being stolen, copied, undermined…

How to file a UDRP complaint

How To's4 mins

How to file a UDRP complaint

Cybersquatting cases have increased by over 11 percent in the last year.  Scammers often register…

Seller Lists: A solution to speed up infringement processing

What's new in Red Points3 mins

Seller Lists: A solution to speed up infringement processing

For businesses trying to cope with a continuous influx of potential infringements, the processing time…

Introduction to Alibaba IP Protection Platform

Brand Protection3 mins

Introduction to Alibaba IP Protection Platform

Alibaba Group is a major player in the ecommerce space and currently owns some of…

The ultimate guide on how to protect domain names

Brand Protection4 mins

The ultimate guide on how to protect domain names

Domain names are more than simple web addresses. They are the entry point for a…

How to protect your brand name

Brand Protection7 mins

How to protect your brand name

The bigger your brand gets, the more vulnerable it will become to counterfeiters, cybersquatters, and…

How to take down a Twitter account

Impersonation Removal7 mins

How to take down a Twitter account

With nearly 260 million active daily users, Twitter has become a staple of online life…

How to take down a Google review

How To's7 mins

How to take down a Google review

With 89% of people now preferring not to use a business until they have read…

How to deal with domain squatters effectively

Impersonation Removal5 mins

How to deal with domain squatters effectively

Domain squatters are not new in the field of cybercrime.  Domains are highly sought after…

Want more?

Something went wrong

Thanks for subscribing!

Join our weekly newsletter for new content updates, how-to's, exclusive online event invites and much more.

Please complete these required fields.

You’ll receive a confirmation mail.