IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Consumer Data Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Consumer Data Privacy Reports
 
Top 10 Questions to Ask Your Cobrowse Vendor
sponsored by Oracle Corporation
WHITE PAPER: What do you need to know before selecting an online customer service option? Access this helpful white paper ot get 10 questions you should ask your Cobrowse vender to determine whether a web based customer service solution is right for you.
Posted: 10 Mar 2015 | Published: 31 Dec 2014

Oracle Corporation

eBook: How Customer Experience Impacts Your Identity and Access Management Practices
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses how customer experience influences IAM and security and examines the actions you can take to deliver secure, seamless experience for your customers.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Ping Identity Corporation

Deep Dive: Mobile CRM for Sales
sponsored by Oracle Corporation
VIDEO: See how Oracle Sales Cloud solves key sales performance management gaps by putting the information you need in one app.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

Oracle Corporation

E-commerce 101: A Guide to Successful Selling on the Web
sponsored by GeoTrust, Inc.
WHITE PAPER: In this informative white paper, get help setting up, securing, and promoting your e-commerce site as you uncover the basics of e-commerce and learn how to avoid the pitfalls that can distress even the savviest of planners.
Posted: 11 Dec 2012 | Published: 30 Dec 2011

GeoTrust, Inc.

Nine Easy Steps for a Quick Customer Experience Tune-Up
sponsored by SAP America, Inc.
WHITE PAPER: As competitors begin to offer comparable products, the customer experience (CE) becomes the new imperative for ensuring customer loyalty and satisfaction. This white paper provides nine easy steps for a quick customer experience tune-up. Use these helpful tips to start improving your customer experience today.
Posted: 25 Jul 2011 | Published: 25 Jul 2011

SAP America, Inc.

The business impact of data security regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken.
Posted: 11 Aug 2009 | Published: 11 Jun 2009

Sophos, Inc.

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM

SSL: The Backbone of Doing Business over the Internet
sponsored by VeriSign, Inc
WHITE PAPER: Read this white paper to learn about technology in place today that helps online businesses protect sensitive customer data, authenticate themselves, and build consumer trust.
Posted: 17 Feb 2014 | Published: 01 Oct 2008

VeriSign, Inc

15 Minutes to Complete Data Protection
sponsored by CipherOptics
WHITE PAPER: Increasingly, data is the most important asset a company owns. Protecting this data used to mean costly configurations that resulted in increased latency and network speed. This paper examines ways to protect this valuable data in just 15 minutes.
Posted: 13 Mar 2006 | Published: 31 Dec 2005

CipherOptics

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement