IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Privacy Reports
 
The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

Data Analytics Maps Positive Customer Journeys
sponsored by SearchCRM
EBOOK: Amid the noise of multiple communication channels, data analytics strategies can identify needs, predict behavior and enhance the customer experience.
Posted: 28 Sep 2016 | Published: 26 Sep 2016

SearchCRM

Consumer Trust Test: Does Your E-business Pass the Test?
sponsored by VeriSign, Inc
PRODUCT LITERATURE: Give potential customers the confidence that you can collect their sensitive personal information securely online, and you'll have a customer for life.
Posted: 01 Mar 2005 | Published: 01 Mar 2005

VeriSign, Inc

Certifiedmail Managed Service
sponsored by DataMotion
WHITE PAPER: Schalleur, Devine & Surgent (SDS) is a mid‐sized Certified Public Accounting agency with over 30 employees comprised of CPAs and other certified professionals based in Devon, Pennsylvania.
Posted: 09 Feb 2011 | Published: 08 Feb 2011

DataMotion

Data Privacy e-Book
sponsored by SearchSecurity.co.UK
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

SearchSecurity.co.UK

Protect Your Customer Data for Peace of Mind
sponsored by Cisco Systems, Inc.
WHITE PAPER: When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.
Posted: 22 Feb 2008 | Published: 01 Jan 2007

Cisco Systems, Inc.

Three Ways Online Anonymity Hurts Businesses and Consumers
sponsored by Gigya
WHITE PAPER: While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

Gigya

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Top Five Security Issues for Small and Medium-Sized Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement