Sensitive Personal Data Reports

How Sales and Marketing Can Thrive on Real Purchase Intent
sponsored by TechTarget
WEBCAST: More than half of B2B brands say they rely on purchase intent data, yet research suggests most marketers lack access to the people actually exhibiting intent. Watch this video to see how TechTarget’s publisher-based model provides access to the active, opted-in prospects you need to hit your KPIs and grow your business.
Posted: 08 Feb 2021 | Premiered: Apr 9, 2020

TechTarget

Three Ways Personas Can Improve ABM Performance
sponsored by TechTarget
EBOOK: Download this eBook to understand how you can engage a broader cross-section of roles to open up new opportunities, make progress by uncovering new personas, grow account penetration and optimize your investments throughout the customer lifecycle.
Posted: 08 Feb 2021 | Published: 11 Sep 2020

TechTarget

Three Ways Online Anonymity Hurts Businesses and Consumers
sponsored by Gigya
WHITE PAPER: While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

Gigya

Vault-Like Protection for 200 Financial Services Locations
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it
Posted: 26 Oct 2009 | Published: 26 Oct 2009

WatchGuard Technologies, Inc.

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Protect Your Customer Data for Peace of Mind
sponsored by Cisco Systems, Inc.
WHITE PAPER: When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.
Posted: 22 Feb 2008 | Published: 01 Jan 2007

Cisco Systems, Inc.

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust

Scalable Data Quality: A Seven Step Plan for Any Size Organization
sponsored by Melissa
WHITE PAPER: No matter the size of your business, data quality is an absolute requirement for success. Learn the seven steps you need to develop a plan for data quality - one that scales to your growing business needs.
Posted: 07 Jun 2007 | Published: 01 Jun 2007

Melissa

Big Data and Personal Data Lead to the Internet's Most Surprising Consumer Products
sponsored by SAP
WHITE PAPER: In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

SAP

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc