IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Personal Data Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Personal Data Privacy Reports
 
Big Data is Key to Responding to Customer Needs Instantly
sponsored by Hewlett-Packard Company
WHITE PAPER: Find out how a leading big data technology extracts vital information from a network and correlates it with more static information about the subscriber, so you can provide a better customer experience.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Hewlett-Packard Company

Oracle Cobrowsing Competitive One-Pager
sponsored by Oracle Corporation
RESOURCE: How can you pick the visual sharing software that's right for your organization? In this concise fact sheet, browse through various component and features of popular visual sharing technologies including Oracle's Cobrowse, Salesforce, Kana, WebEx, and more to compare and contrast the specifics of each software.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

Oracle Corporation

Case Study - ABnote launches TransPromo platform for brazilian bank Bradesco
sponsored by GMC Software
CASE STUDY: When ABnote in Sao Paolo Brazil wanted to add promotional or educational messages to their transactional correspondence they turned to one platform to fulfill their communications needs and create a competitive advantage.Discover what platform enabled ABnote to implement this communications strategy with a very short timeline.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

GMC Software

Good Service, Happy Customers: Oracle Cloud Customer Service and Support
sponsored by Oracle Corporation
VIDEO: Watch this quick video to learn more about the benefits of using Oracle customer service and support platforms to deliver impeccable customer experiences that drive sales and increase revenue with the ease of cloud technology.
Posted: 04 Mar 2015 | Premiered: 28 Sep 2012

Oracle Corporation

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

Top Five Security Issues for Small and Medium-Sized Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

Cisco Systems, Inc.

Certifiedmail Managed Service
sponsored by DataMotion
WHITE PAPER: Schalleur, Devine & Surgent (SDS) is a mid‐sized Certified Public Accounting agency with over 30 employees comprised of CPAs and other certified professionals based in Devon, Pennsylvania.
Posted: 09 Feb 2011 | Published: 08 Feb 2011

DataMotion

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement