IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Sensitive Personal Data

RSS Feed    Add to Google    Add to My Yahoo!
Sensitive Personal Data Reports
 
How Personalized, Compliant Service Boosts Loyalty and Avoids Liability
sponsored by Oracle Corporation
WHITE PAPER: Access this informative white paper to learn more about the complex relationship between compliance and personalization. Get 5 steps to boost loyalty and avoid liability.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

Oracle Corporation

Communicating in the New Age of the Digital Banker
sponsored by GMC Software
WHITE PAPER: In this white paper discover how your bank can devise a plan to cater to connected customers. Find new ways to communicate in the modern world including mobile, multichannel, and more.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

GMC Software

E-commerce 101: A Guide to Successful Selling on the Web
sponsored by GeoTrust, Inc.
WHITE PAPER: In this informative white paper, get help setting up, securing, and promoting your e-commerce site as you uncover the basics of e-commerce and learn how to avoid the pitfalls that can distress even the savviest of planners.
Posted: 11 Dec 2012 | Published: 30 Dec 2011

GeoTrust, Inc.

Get Full Customer 360 with Oracle Sales Cloud
sponsored by Oracle Corporation
VIDEO: See how Oracle Sales Cloud solves key sales performance management gaps by putting the information you need in one app.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

Oracle Corporation

Oracle Cobrowsing Competitive One-Pager
sponsored by Oracle Corporation
RESOURCE: How can you pick the visual sharing software that's right for your organization? In this concise fact sheet, browse through various component and features of popular visual sharing technologies including Oracle's Cobrowse, Salesforce, Kana, WebEx, and more to compare and contrast the specifics of each software.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

Oracle Corporation

How to Choose an Endpoint Backup Solution
sponsored by Code42
WHITE PAPER: Hacked, stolen, or lost end-user devices means organizations are vulnerable to compliance failures, data loss, customer privacy breaches, damaged brand reputation, and more. It is crucial to regularly and fully back up endpoints to avoid these risks. This resource provides what to look for in an endpoint backup solution.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement