IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Sensitive Personal Data

RSS Feed   
Sensitive Personal Data Reports
 
12 Ways to Make Your E-Commerce Customers Love You
sponsored by New Relic
RESOURCE: Stop sending your customers to your competitors! In this helpful blog post, discover 12 ways to make your e-commerce customers fall in love with your business, and unlock expert tips for building ongoing customer loyalty.
Posted: 15 Jul 2019 | Published: 09 Feb 2018

New Relic

Europe: High-stakes CX
sponsored by Verizon
WHITE PAPER: How can your organization break through Europe's unique set of CX challenges? Inside, discover the ways brands can overcome the que set of challenges Europe provides to enjoy significant CX success in the region, and learn why Europeans are so distrusting of brands using their data.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

Verizon

Overcome the Greatest MSP Challenge: Customer Acquisition
sponsored by Unitrends
EBOOK: This e-book is designed to help you overcome the customer acquisition hurdle. Download it for guidance on not only finding new customers, but ensuring their data—as well as that of your existing customers—is secure and protected.
Posted: 01 May 2019 | Published: 14 Mar 2019

Unitrends

Chatbots: Improve Your CX Strategy
sponsored by ServiceNow
EGUIDE: Chatbots are a great option for handling frequent, easy-to-answer questions, but how effective are they in a CX strategy? Inside, explore the benefits of chatbot technology. Learn how chatbots can help improve your CX strategy, and discover how to determine the right point for chatbot-human handoff.
Posted: 17 Jul 2019 | Published: 15 Jul 2019

ServiceNow

Vault-Like Protection for 200 Financial Services Locations
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it
Posted: 26 Oct 2009 | Published: 26 Oct 2009

WatchGuard Technologies, Inc.

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

Three Ways Online Anonymity Hurts Businesses and Consumers
sponsored by Gigya
WHITE PAPER: While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

Gigya

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement