Privacy Reports

Webinar: Who You Gonna Call?
sponsored by TechTarget
WEBCAST: Are you aligned to maximize customer revenue across marketing, sales, and customer success? Having the right data and insights will help. In this webinar, get expert tips how to use intent monitoring and the data collected to maximize opportunity capture across the entire revenue lifecycle, and deliver a seamless customer journey.
Posted: 08 Feb 2021 | Premiered: Jun 1, 2020

TechTarget

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust

Vault-Like Protection for 200 Financial Services Locations
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it
Posted: 26 Oct 2009 | Published: 26 Oct 2009

WatchGuard Technologies, Inc.

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Big Data and Personal Data Lead to the Internet's Most Surprising Consumer Products
sponsored by SAP
WHITE PAPER: In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

SAP

Data Privacy e-Book
sponsored by TechTarget ComputerWeekly.com 
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

TechTarget ComputerWeekly.com 

Data Analytics Maps Positive Customer Journeys
sponsored by TechTarget Customer Experience
EBOOK: Amid the noise of multiple communication channels, data analytics strategies can identify needs, predict behavior and enhance the customer experience.
Posted: 28 Sep 2016 | Published: 26 Sep 2016

TechTarget Customer Experience

The Business Benefits of Managing Cyber Risk and Minimizing Unnecessary Data
sponsored by UnitedLex
EGUIDE: Cyber risk management is becoming an increasingly important area of concern as company directors' realize the limitations of insurance. How can you address this risk and instill confidence in your customer engagement? Find out how to enhance your cyber risk management using 4 key strategies.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex