IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Customer Data Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Customer Data PrivacyWhite Papers (View All Report Types)
 
The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration
sponsored by IntraLinks, Inc
WHITE PAPER: This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

15 Minutes to Complete Data Protection
sponsored by CipherOptics
WHITE PAPER: Increasingly, data is the most important asset a company owns. Protecting this data used to mean costly configurations that resulted in increased latency and network speed. This paper examines ways to protect this valuable data in just 15 minutes.
Posted: 13 Mar 2006 | Published: 31 Dec 2005

CipherOptics

Nine Easy Steps for a Quick Customer Experience Tune-Up
sponsored by SAP America, Inc.
WHITE PAPER: As competitors begin to offer comparable products, the customer experience (CE) becomes the new imperative for ensuring customer loyalty and satisfaction. This white paper provides nine easy steps for a quick customer experience tune-up. Use these helpful tips to start improving your customer experience today.
Posted: 25 Jul 2011 | Published: 25 Jul 2011

SAP America, Inc.

Three Ways Online Anonymity Hurts Businesses and Consumers
sponsored by Gigya
WHITE PAPER: While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

Gigya

The business impact of data security regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken.
Posted: 11 Aug 2009 | Published: 11 Jun 2009

Sophos, Inc.

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc

Protect Your Customer Data for Peace of Mind
sponsored by Cisco Systems, Inc.
WHITE PAPER: When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.
Posted: 22 Feb 2008 | Published: 01 Jan 2007

Cisco Systems, Inc.

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

Making Support Social: Turning Customer Engagement Into Customer Success
sponsored by Consona Corporation
WHITE PAPER: Social media is fundamentally changing how businesses and their customers interact. In this paper, learn of some of the broad trends in social media, and then provide specific guidance on how to use social media to deliver support better, faster and cheaper.
Posted: 17 Jun 2011 | Published: 01 May 2010

Consona Corporation

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement