IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Sensitive Personal Data

RSS Feed   
Sensitive Personal Data Reports
 
Consumer Pivot to Digital – During and After COVID-19
sponsored by Fractal
WEBCAST: Watch this video for tips on creating an omnichannel experience that can help you support customers during and after COVID-19.
Posted: 01 Sep 2020 | Premiered: Aug 20, 2020

Fractal

The CX Balancing Act: Personalization Meets Respect for Customer Privacy.
sponsored by Verizon
RESOURCE: Access this resource to see what it takes for customer to share their data and discover the top 3 CX experiences a company should deliver in exchange for personal information.
Posted: 28 Jul 2020 | Published: 08 Apr 2020

Verizon

10 Questions to Ask Before Considering A Customer Data Platform
sponsored by Reltio
EBOOK: If you struggle with consolidating, organizing and distributing customer data, you’re not alone—many organizations do. That’s why using a customer data platform (CDP) is so helpful. Download this checklist to review 10 questions that you should consider before implementing a CDP.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Reltio

Winning the CX war: Crafting the perfect experience
sponsored by Verizon
WHITE PAPER: Access this research report to see how you can harness and analyze customer data to provide top-notch customer service.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Verizon

Three Ways Personas Can Improve Your ABM Performance
sponsored by TechTarget
EBOOK: Download this eBook to understand how you can engage a broader cross-section of roles to open up new opportunities, make progress by uncovering new personas, grow account penetration and optimize your investments throughout the customer lifecycle.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

TechTarget

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust

Scalable Data Quality: A Seven Step Plan for Any Size Organization
sponsored by Melissa
WHITE PAPER: No matter the size of your business, data quality is an absolute requirement for success. Learn the seven steps you need to develop a plan for data quality - one that scales to your growing business needs.
Posted: 07 Jun 2007 | Published: 01 Jun 2007

Melissa

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Data Privacy e-Book
sponsored by SearchSecurity.co.UK
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

SearchSecurity.co.UK

Vault-Like Protection for 200 Financial Services Locations
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it
Posted: 26 Oct 2009 | Published: 26 Oct 2009

WatchGuard Technologies, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info