IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Sensitive Personal Data

RSS Feed    Add to Google    Add to My Yahoo!
Sensitive Personal Data Reports
 
The Value of Experience: How the C-suite Values Customer Experience in the Digital Age
sponsored by Genesys
RESOURCE: This research report demonstrates how companies who pay more attention to customer experience initiatives have better revenue growth than their peers. Access now to get answers to 4 essential CEM questions that top sales and marketing leaders have proposed.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

Genesys

Big Data is Key to Responding to Customer Needs Instantly
sponsored by Hewlett-Packard Company
WHITE PAPER: Find out how a leading big data technology extracts vital information from a network and correlates it with more static information about the subscriber, so you can provide a better customer experience.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Hewlett-Packard Company

Certifiedmail Managed Service
sponsored by DataMotion
WHITE PAPER: Schalleur, Devine & Surgent (SDS) is a midā€sized Certified Public Accounting agency with over 30 employees comprised of CPAs and other certified professionals based in Devon, Pennsylvania.
Posted: 09 Feb 2011 | Published: 08 Feb 2011

DataMotion

Consumer Trust Test: Does Your E-business Pass the Test?
sponsored by VeriSign, Inc
PRODUCT LITERATURE: Give potential customers the confidence that you can collect their sensitive personal information securely online, and you'll have a customer for life.
Posted: 01 Mar 2005 | Published: 01 Mar 2005

VeriSign, Inc

Evaluating Storage Security Solutions: Considerations and Best Practices for Securing Sensitive Data
sponsored by Decru, a NetApp company
WHITE PAPER: Enterprises are no longer asking "why do I need to encrypt?" Instead, they are asking "what do I have to encrypt and how should I do it?" As encryption technologies proliferate, learn what you need to know to pick the ri...
Posted: 13 Dec 2006 | Published: 01 Dec 2006

Decru, a NetApp company

SSL: The Backbone of Doing Business over the Internet
sponsored by VeriSign, Inc
WHITE PAPER: Read this white paper to learn about technology in place today that helps online businesses protect sensitive customer data, authenticate themselves, and build consumer trust.
Posted: 17 Feb 2014 | Published: 01 Oct 2008

VeriSign, Inc

Nine Easy Steps for a Quick Customer Experience Tune-Up
sponsored by SAP America, Inc.
WHITE PAPER: As competitors begin to offer comparable products, the customer experience (CE) becomes the new imperative for ensuring customer loyalty and satisfaction. This white paper provides nine easy steps for a quick customer experience tune-up. Use these helpful tips to start improving your customer experience today.
Posted: 25 Jul 2011 | Published: 25 Jul 2011

SAP America, Inc.

Scalable Data Quality: A Seven Step Plan for Any Size Organization
sponsored by Melissa Data Corp
WHITE PAPER: No matter the size of your business, data quality is an absolute requirement for success. Learn the seven steps you need to develop a plan for data quality - one that scales to your growing business needs.
Posted: 07 Jun 2007 | Published: 01 Jun 2007

Melissa Data Corp

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement