IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Personal Data Privacy

RSS Feed   
Personal Data Privacy Reports
 
The Future of the Contact Center
sponsored by Avaya
RESEARCH CONTENT: In this Gartner research report, discover what to expect from the future contact center. Learn how AI can help revolutionize your engagement and interactions, and explore the technological changes paving the way for the contact center of the future, including cloud technology, chatbots, and more.
Posted: 24 May 2019 | Published: 25 Apr 2019

Avaya

12 Ways to Make Your E-Commerce Customers Love You
sponsored by New Relic
RESOURCE: Stop sending your customers to your competitors! In this helpful blog post, discover 12 ways to make your e-commerce customers fall in love with your business, and unlock expert tips for building ongoing customer loyalty.
Posted: 15 Jul 2019 | Published: 09 Feb 2018

New Relic

Overcome the Greatest MSP Challenge: Customer Acquisition
sponsored by Unitrends
EBOOK: This e-book is designed to help you overcome the customer acquisition hurdle. Download it for guidance on not only finding new customers, but ensuring their data—as well as that of your existing customers—is secure and protected.
Posted: 01 May 2019 | Published: 14 Mar 2019

Unitrends

Chatbots: Improve Your CX Strategy
sponsored by ServiceNow
EGUIDE: Chatbots are a great option for handling frequent, easy-to-answer questions, but how effective are they in a CX strategy? Inside, explore the benefits of chatbot technology. Learn how chatbots can help improve your CX strategy, and discover how to determine the right point for chatbot-human handoff.
Posted: 17 Jul 2019 | Published: 15 Jul 2019

ServiceNow

Data Analytics Maps Positive Customer Journeys
sponsored by SearchCRM
EBOOK: Amid the noise of multiple communication channels, data analytics strategies can identify needs, predict behavior and enhance the customer experience.
Posted: 28 Sep 2016 | Published: 26 Sep 2016

SearchCRM

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Vault-Like Protection for 200 Financial Services Locations
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it
Posted: 26 Oct 2009 | Published: 26 Oct 2009

WatchGuard Technologies, Inc.

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

Scalable Data Quality: A Seven Step Plan for Any Size Organization
sponsored by Melissa
WHITE PAPER: No matter the size of your business, data quality is an absolute requirement for success. Learn the seven steps you need to develop a plan for data quality - one that scales to your growing business needs.
Posted: 07 Jun 2007 | Published: 01 Jun 2007

Melissa

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement