IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Sensitive Personal Data

RSS Feed    Add to Google    Add to My Yahoo!
Sensitive Personal Data Reports
Why Mobile Performance Matters: U.K. Consumer Analytics
sponsored by Akamai
WHITE PAPER: In this white paper, you will identify key web consumer performance insights in the e-commerce and financial services industries. Access this paper now to see the 2 factors causing consumer dissatisfaction, why mobile users are more active than desktops, and more.
Posted: 10 Sep 2015 | Published: 10 Sep 2015


Storing Data in the Cloud and Data Residency Laws: Irreconcilable Differences?
sponsored by Vaultive
WHITE PAPER: In this white paper, learn why data encryption may be the savior for data security and privacy in the cloud and what regulators are saying in response. Access this resource now to discover if data encryption can keep your organization safe from data breaches and enable you to take advantage of cloud computing benefits.
Posted: 22 Sep 2015 | Published: 20 Apr 2015


Oracle Cobrowse vs. Top Visual Sharing Tech
sponsored by Oracle Corporation
RESOURCE: How can you pick the visual sharing software that's right for your organization? In this concise fact sheet, browse through various components and features of popular visual sharing technologies including Oracle's Cobrowse, Salesforce, Kana, WebEx, and more to compare and contrast the specifics of each software.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

Oracle Corporation

Making Support Social: Turning Customer Engagement Into Customer Success
sponsored by Consona Corporation
WHITE PAPER: Social media is fundamentally changing how businesses and their customers interact. In this paper, learn of some of the broad trends in social media, and then provide specific guidance on how to use social media to deliver support better, faster and cheaper.
Posted: 17 Jun 2011 | Published: 01 May 2010

Consona Corporation

Data Privacy e-Book
sponsored by
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

Vault-Like Protection for 200 Financial Services Locations
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it
Posted: 26 Oct 2009 | Published: 26 Oct 2009

WatchGuard Technologies, Inc.

Three Ways Online Anonymity Hurts Businesses and Consumers
sponsored by Gigya
WHITE PAPER: While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.
Posted: 27 Jan 2014 | Published: 31 Dec 2013


How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Evaluating Storage Security Solutions: Considerations and Best Practices for Securing Sensitive Data
sponsored by Decru, a NetApp company
WHITE PAPER: Enterprises are no longer asking "why do I need to encrypt?" Instead, they are asking "what do I have to encrypt and how should I do it?" As encryption technologies proliferate, learn what you need to know to pick the ri...
Posted: 13 Dec 2006 | Published: 01 Dec 2006

Decru, a NetApp company

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement