ComputerWeekly.com Research Library

Powered by Bitpipe.com

Customer Privacy Research

  • The components and objectives of privacy engineering

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.

  • 10 Questions To Ask Before Considering A Customer Data Platform

    Sponsored by: Reltio

    If you struggle with consolidating, organizing and distributing customer data, you’re not alone—many organizations do. That’s why using a customer data platform (CDP) is so helpful. Download this checklist to review 10 questions that you should consider before implementing a CDP.

  • CW Innovation Awards: SIA taps blockchain for loyalty app

    Sponsored by: ComputerWeekly.com

    In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.

  • Three Ways Personas Can Improve Your ABM Performance

    Sponsored by: TechTarget

    Download this eBook to understand how you can engage a broader cross-section of roles to open up new opportunities, make progress by uncovering new personas, grow account penetration and optimize your investments throughout the customer lifecycle.

  • Webinar: Who You Gonna Call?

    Sponsored by: TechTarget

    Are you aligned to maximize customer revenue across marketing, sales, and customer success? Having the right data and insights will help. In this webinar, get expert tips how to use intent monitoring and the data collected to maximize opportunity capture across the entire revenue lifecycle, and deliver a seamless customer journey.

  • How Sales and Marketing Can Thrive on Real Purchase Intent

    Sponsored by: TechTarget

    More than half of B2B brands say they rely on purchase intent data, yet research suggests most marketers lack access to the people actually exhibiting intent. Watch this video to see how TechTarget’s publisher-based model provides access to the active, opted-in prospects you need to hit your KPIs and grow your business.

  • Data Analytics Maps Positive Customer Journeys

    Sponsored by: SearchCRM

    Amid the noise of multiple communication channels, data analytics strategies can identify needs, predict behavior and enhance the customer experience.

  • The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data

    Sponsored by: UnitedLex

    Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.

  • Big Data and Personal Data Lead to the Internet's Most Surprising Consumer Products

    Sponsored by: SAP

    In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise.

  • Three Ways Online Anonymity Hurts Businesses and Consumers

    Sponsored by: Gigya

    While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.

  • Rabobank International Enabling Customers to Bank Safe With HP

    Sponsored by: Hewlett-Packard Enterprise

    View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.

  • Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance

    Sponsored by: HyTrust

    2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.

  • Data Privacy e-Book

    Sponsored by: SearchSecurity.co.UK

    SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.

  • How retailers can manage customer data collection to decrease fraud

    Sponsored by: SonicWALL

    This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.

  • Vault-Like Protection for 200 Financial Services Locations

    Sponsored by: WatchGuard Technologies, Inc.

    Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it

  • Protecting Healthcare Organizations from Patient Data Loss

    Sponsored by: Code Green Networks, Inc.

    Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.

  • Data Breach Case Study: Heartland Payment Systems

    Sponsored by: Sourcefire

    Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.

  • Web Application Security: Automated Scanning versus Manual Penetration Testing

    Sponsored by: Logicalis

    This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.

  • Top Five Security Issues for Small and Medium-Sized Businesses

    Sponsored by: Cisco Systems, Inc.

    Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.

  • Protect Your Customer Data for Peace of Mind

    Sponsored by: Cisco Systems, Inc.

    When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.

  • Scalable Data Quality: A Seven Step Plan for Any Size Organization

    Sponsored by: Melissa

    No matter the size of your business, data quality is an absolute requirement for success. Learn the seven steps you need to develop a plan for data quality - one that scales to your growing business needs.

  • Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them

    Sponsored by: VeriSign, Inc

    The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.