IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Privacy

RSS Feed   
Data Privacy Reports
 
The Customer Experience Perspective
sponsored by ServiceNow
EBOOK: Corinium Global Intelligence recently asked 100 C – level professionals how they optimize customer service within their organization. Access this eBook to explore the results from the study, and review the about the 5 keys to a successful customer service operation.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

ServiceNow

Maximize Revenue Opportunity with Contact-Level Intent Data
sponsored by TechTarget
WEBCAST: Are you aligned to maximize customer revenue across marketing, sales, and customer success? Having the right data and insights will help. In this webinar, get expert tips how to use intent monitoring and the data collected to maximize opportunity capture across the entire revenue lifecycle, and deliver a seamless customer journey.
Posted: 01 Jun 2020 | Premiered: Jun 1, 2020

TechTarget

The UK Contact Center Decision-Maker’s Guide 2018-19
sponsored by FourNet
ANALYST REPORT: The "UK Contact Center Decision-Makers’ Guide (2018/19 - 16th edition)" is a major annual report studying the performance, operations, technology and HR aspects of UK contact center operations. Download the report to uncover 7 of the major pain points and issues that affect the contact center industry and recommendations for solving these issues.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

FourNet

Aberdeen Report: The return on managing customer convenience in modern service programs
sponsored by ServiceNow
RESEARCH CONTENT: Download this Aberdeen report to explore why customer convenience is increasingly important in modern service programs, and get expert recommendations on how to minimize customer effort.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

ServiceNow

Big Data and Personal Data Lead to the Internet's Most Surprising Consumer Products
sponsored by SAP
WHITE PAPER: In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

SAP

Data Privacy e-Book
sponsored by SearchSecurity.co.UK
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

SearchSecurity.co.UK

Vault-Like Protection for 200 Financial Services Locations
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it
Posted: 26 Oct 2009 | Published: 26 Oct 2009

WatchGuard Technologies, Inc.

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc

Scalable Data Quality: A Seven Step Plan for Any Size Organization
sponsored by Melissa
WHITE PAPER: No matter the size of your business, data quality is an absolute requirement for success. Learn the seven steps you need to develop a plan for data quality - one that scales to your growing business needs.
Posted: 07 Jun 2007 | Published: 01 Jun 2007

Melissa

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info