IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Sensitive Personal Data

RSS Feed   
Sensitive Personal Data Reports
 
A Guide to the Most Common CRM Use Cases
sponsored by Greenhouse
WHITE PAPER: View this e-book to learn about the common questions you should consider before investing in a CRM strategy, and find out how to leverage your CRM effectively with a series of expert tips from Greenhouse CRM.
Posted: 25 Apr 2019 | Published: 25 Apr 2019

Greenhouse

Overcome the Greatest MSP Challenge: Customer Acquisition
sponsored by Unitrends
EBOOK: This e-book is designed to help you overcome the customer acquisition hurdle. Download it for guidance on not only finding new customers, but ensuring their data—as well as that of your existing customers—is secure and protected.
Posted: 01 May 2019 | Published: 14 Mar 2019

Unitrends

Superior Customer Experience With MDM and Big Data Insights
sponsored by Informatica
WHITE PAPER: Find out how you can ensure that your customer data remains reliable and trustworthy as you access, consolidate, and manage it, making it more complex than ever.
Posted: 06 Apr 2018 | Published: 29 Dec 2017

Informatica

Trends in Customer Trust
sponsored by Salesforce
RESEARCH CONTENT: As lines between digital and physical worlds blur, today's customers demand deeply relevant, personalized experiences across devices, channels, and interactions. Download this research brief to explore why trust is foundational to CX and what businesses can do to foster trust while meeting the demands for tailored engagement.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Salesforce

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

Data Privacy e-Book
sponsored by SearchSecurity.co.UK
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

SearchSecurity.co.UK

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement