IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Sensitive Personal Data

RSS Feed    Add to Google    Add to My Yahoo!
Sensitive Personal Data Multimedia (View All Report Types)
 
Modern Relationships: Predictive Analytics, Machine Learning and Meaningful Customer Relationships
sponsored by Zendesk
VIDEO: Join Jason Maynard, Director of Data and Analytics, and Dave Dyson, Senior Customer Service Evangelist to learn how machine learning can help improve your customer relationships, and how predictive analytics can further improve support and raise customer satisfaction.
Posted: 19 Apr 2017 | Premiered: 30 Dec 2016

Zendesk

Case Study: How Atom Bank Used CEM To Become The UK's First All-Digital Bank
sponsored by Genesys
VIDEO: In the digital age, it's become necessary for businesses to constantly rework and reimagine how they interact with their customers. In this case study, learn how Atom Bank became the UK's first all-digital bank. Discover how customer experience technology was implemented to allow customers to communicate using voice, chat, email or social media.
Posted: 27 Feb 2017 | Premiered: 27 Feb 2017

Genesys

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

TIBCO Spotfire Server Overview
sponsored by TIBCO Software Inc.
VIDEO: With its role-based access permissions, TIBCO Spotfire incorporates data discovery, data wrangling, and predictive analytics into a cohesive platform. Learn how to leverage a variety of key resources and services that scale.
Posted: 16 Jun 2017 | Premiered: 21 Feb 2017

TIBCO Software Inc.

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks

Top 5 Requirements for Cloud-Native Application Traffic Management & Security
sponsored by A10 Networks
WEBCAST: Join expert Kamal Anand in this webinar as he unveils modern strategies for managing application security and performance across cloud environments.
Posted: 13 Feb 2017 | Premiered: Dec 14, 2016

A10 Networks

The Future of Privileged Management: Understanding the Bigger Picture
sponsored by One Identity
VIDEO: Discover how privileged user management is critical for risk mitigation, compliance, and data protection and management.
Posted: 16 Mar 2017 | Premiered: 08 Dec 2016

One Identity

Cherwell Service Management Product Overview Video
sponsored by Cherwell
VIDEO: If you organization is looking to implement, update, or automate ITSM, watch this brief video to learn about Cherwell Service Management software and its key features, including out of the box ITIL certified processes, a modern, intuitive self-service portal, codeless technology, and more.
Posted: 12 Apr 2017 | Premiered: 06 Sep 2016

Cherwell

Security in a Mobile First World
sponsored by AVST
WEBCAST: Watch this webcast to learn mobile practices that will provide your business with secure mobile communications.
Posted: 14 Feb 2017 | Premiered: Dec 15, 2016

AVST

POWER8 Cost Savings Estimator
sponsored by IBM
WEBCAST: See how much you can save.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement