IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Online Customer Privacy

RSS Feed   
Online Customer Privacy Reports
 
The Customer Experience Perspective
sponsored by ServiceNow
EBOOK: Corinium Global Intelligence recently asked 100 C – level professionals how they optimize customer service within their organization. Access this eBook to explore the results from the study, and review the about the 5 keys to a successful customer service operation.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

ServiceNow

Bring Secure, Frictionless Customer Experiences to Market Faster with Modern CIAM
sponsored by Okta
WHITE PAPER: To meet the security and privacy expectations of today’s customers, organizations need to put their customers’ identity front and center. A customer identity and access management (CIAM) solution can do just that. Learn how Okta Identity Cloud can help you address your IAM and CIAM concerns today and in the future.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Okta

Overcome the Greatest MSP Challenge: Customer Acquisition
sponsored by Unitrends
EBOOK: This e-book is designed to help you overcome the customer acquisition hurdle. Download it for guidance on not only finding new customers, but ensuring their data—as well as that of your existing customers—is secure and protected.
Posted: 01 May 2019 | Published: 14 Mar 2019

Unitrends

The UK Contact Center Decision-Maker’s Guide 2018-19
sponsored by 4Net
ANALYST REPORT: The "UK Contact Center Decision-Makers’ Guide (2018/19 - 16th edition)" is a major annual report studying the performance, operations, technology and HR aspects of UK contact center operations. Download the report to uncover 7 of the major pain points and issues that affect the contact center industry and recommendations for solving these issues.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

4Net

Artificial intelligence: Friend or Foe of Customer Service?
sponsored by Genesys
WHITE PAPER: Download this CustomerThink paper to learn about the use of AI in customer service and explore guidance from analysts and industry leaders in the market.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Genesys

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

Big Data and Personal Data Lead to the Internet's Most Surprising Consumer Products
sponsored by SAP
WHITE PAPER: In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

SAP

Top Five Security Issues for Small and Medium-Sized Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

Cisco Systems, Inc.

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info