IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Sensitive Personal Data

RSS Feed   
Sensitive Personal Data Reports
 
The Ultimate Guide to As-A-Service: Customer Onboarding & Retention
sponsored by ConnectWise
EBOOK: Read this e-book to gain a 30-45-day playbook for onboarding new customers, tips for expanding your service portfolio, and guidance on evaluating your customer base and introducing existing customers to new services.
Posted: 27 Feb 2020 | Published: 31 Dec 2019

ConnectWise

How IT Leaders Can Position Customer Experience Initiatives for Success
sponsored by Comcast Business
RESEARCH CONTENT: 76% of the respondents surveyed by IDG and Comcast said they are feeling pressure from multiple sources in the organization to deliver digital CX. Learn why transforming CX is a top digital priority for many organizations, and why IDG says IT will play a key role in this blog post.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Comcast Business

Moments with meaning: Insights from CX Exchange BFSI 2020
sponsored by Genesys
EBOOK: The UK’s leading customer experience event for the banking, financial services and insurance sector sparked plenty of lively conversations this year. Download this guide to review some of the key ideas from the CX Exchange BFSI that can provide some inspiration as you fight to win the customer loyalty war.
Posted: 14 Sep 2020 | Published: 14 Sep 2020

Genesys

Thank you for registering for the CX Virtual Tour on Predictive Engagement
sponsored by Genesys
WEBCAST: How well do you know each of your website visitors? Do you use that information to personalize engagement with them? If not, you could be missing out on key opportunities to build customer and brand loyalty. Sign up today to learn more.
Posted: 08 Sep 2020 | Premiered: Sep 8, 2020

Genesys

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Big Data and Personal Data Lead to the Internet's Most Surprising Consumer Products
sponsored by SAP
WHITE PAPER: In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

SAP

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Data Analytics Maps Positive Customer Journeys
sponsored by SearchCRM
EBOOK: Amid the noise of multiple communication channels, data analytics strategies can identify needs, predict behavior and enhance the customer experience.
Posted: 28 Sep 2016 | Published: 26 Sep 2016

SearchCRM

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info