RSS feed Get our RSS feed

News by Topic

customer protection

Results 26 - 50 of 68Sort Results By: Published Date | Title | Company Name
By: Pindrop Security     Published Date: Mar 21, 2018
One of the largest retail banks in the U.S. sought to improve customer satisfaction in the call center by eliminating time-consuming processes. Limited by a nonspeech- enabled IVR, the bank was constrained to outdated authentication options, such as PIN numbers and knowledge-based authentication (KBA) questions. Long enrollment processes and authentication challenges were driving call handle times up, causing significant customer frustration. The bank turned to Pindrop for help. Using Pindrop’s multi-factor authentication solutions, the bank confidently moved authentication away from costly agent-based KBA questions to passively authenticating callers within the IVR. This not only reduced call handle times but also improved customer account protection, by assessing every caller for risk before enrollment and authentication.
Tags : 
     Pindrop Security
By: Akamai Technologies     Published Date: Jul 02, 2018
Which bot management solution is right for you? Bots are responsible for 30% to 70% of website traffic. They range from good to middling to bad, and from simple to sophisticated. Many bot management vendors say they can solve your bot problem. But can they really? This e-book provides guidance on how to evaluate bot management solutions and understand what the differences mean for you and your customers. We cover the top 10 things to consider when selecting a bot management solution, from accuracy and API protection to flexibility and resilience over time.
Tags : 
     Akamai Technologies
By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper addresses customer pain points, and addresses Disaster Readiness, Operational Efficiency and solutions that can help improve Business Protection.
Tags : servers, server data, downtime, management software, networking and systems management, disaster recovery, disaster readiness
     HP - Intel®
By: Symantec     Published Date: Nov 19, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security
     Symantec
By: Riverbed     Published Date: Feb 26, 2015
In order to be successful today, operations teams require complete application-level visibility across the entire environment.
Tags : customer relationship management, security, human resources, sales force automation, application integration, data protection, network performance
     Riverbed
By: Cloudian     Published Date: Feb 15, 2018
Not so long ago, if you asked a business executive, “what is the most irreplaceable part of your business?” they might have pointed at their building or their employees. The really forward-thinking execs may have chosen their customers. But the reality is that businesses have insurance to deal with the loss of a building; they can hire new employees; and they can acquire new customers. The one thing that is truly irreplaceable is their data. Lose that and you really are out of business. The potential risks to your data can be as subtle as the malfunction of tiny areas on a disk drive or as enormous as the failure of an entire data center. That means it’s not enough just to protect your data — you must also select the best way to protect it. To deliver that protection in an economical and rapidly recoverable way requires a system that gives you complete control to determine levels of data protection based on the type of data. In this paper, we’ll talk about the science of data protect
Tags : 
     Cloudian
By: Shell     Published Date: Aug 15, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. Cheaper oil, for example, may save money initially, but it requires more frequent changes and provides less protection to the equipment, which could shorten component life. For many companies, the short-term savings simply aren’t worth the longterm cost risk. “Some companies don’t realize that they may be able to reduce their overall maintenance costs significantly by spending more up front on better quality lubricants,” Saffell says. “Their equipment may last longer and they are likely to see
Tags : cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
     Shell
By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : cisco, financial services, perception gaps, small business
     Cisco
By: McAfee EMEA     Published Date: Nov 15, 2017
Security Innovation Alliance Partners have integrated, tested, and certified their security solutions to work with McAfee Enterprise Security Manager. We have collaborated with our partners to simplify the integration of these products in even the most complex customer environments. This provides a truly connected security ecosystem that optimizes the value of your existing investments, improves efficiency, maximizes protection, and reduces operational costs.
Tags : entity, analytics, mcafee, enterprise, security, customer, environments
     McAfee EMEA
By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
     Citrix ShareFile
By: netForensics     Published Date: Jan 04, 2008
As incidents of identity theft and fraud skyrocket, companies are scrambling to keep up with complex attacks and effectively safeguard consumer information. If you store, process, or transmit cardholder data, comprehensive visibility, actionable intelligence and the ability to respond rapidly to threats has become paramount.
Tags : pci, pci dss, pci compliance, customer data, data protection, credit card, cardholder, identity theft
     netForensics
By: SAS     Published Date: Apr 25, 2017
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
     SAS
By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
StorageCraft® ShadowProtect® provides superior disaster recovery, data protection and migration services. In this whitepaper find out what else StorageCraft® to help you protect your customers.
Tags : storagecraft, shadowprotect, backup, recovery, networks, msp, continuity, infrastructure
     StorageCraft® Technology Corporation
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn
     Trend Micro, Inc.
By: SAS     Published Date: Apr 04, 2018
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
     SAS
By: Symantec     Published Date: Mar 11, 2013
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes.
Tags : 
     Symantec
By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.
Tags : compliance, pci, payment card, credit card, customer privacy, consumer privacy, consumer data, customer data
     Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: IBM     Published Date: Apr 09, 2015
As The Business Becomes Digital, Security Must Become Data-Centric S&R leaders of enterprises undergoing a digital transformation will soon realize that in order to adequately ensure customer protection and enable a digital workforce, S&R pros must abandon traditional perimeter-based security and put the focus on the data by embracing Forrester’s Zero Trust Model.
Tags : data security, ibm, customer protection, digital workforce, zero trust model, security
     IBM
By: Symantec     Published Date: May 02, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes.
Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
     Symantec
By: HP     Published Date: May 14, 2014
In today’s business environment, customers rely on the most efficient, high performing, and reliable backup systems to protect critical business information. Customers need to protect increasing levels of data while keeping costs under control. HP StoreOnce Backup systems provide a disk-based data protection platform while addressing data growth by applying HP StoreOnce deduplication software for efficient, longer term data retention.This document describes the benefits of using HP StoreOnce Backup systems combined with HP StoreOnce Catalyst software and HP Data Protector to back up important enterprise data. This document also recommends backup and recovery implementations.
Tags : hewlett packard, storeonce, data protector, catalyst software
     HP
By: Thawte     Published Date: Oct 05, 2015
When it comes to protecting your website and customers from attack, knowledge is your best weapon. But with ever-changing threats and ever-evolving defenses comes ever-growing potential for common misconception. To help you cut through the confusion, view our essential guide now and separate website security myth from reality.
Tags : website security myths, customer protection, ever-changing threats, website security, security
     Thawte
By: Thawte     Published Date: Oct 05, 2015
Wenn Sie Ihr Unternehmen und Ihre Kunden vor Angriffen schützen wollen, sollten Sie mit Wissen gewappnet sein. Das ist jedoch nicht einfach, denn die sich ständig ändernde Bedrohungslage und die kontinuierliche Weiterentwicklung der Abwehrmaßnahmen sind der perfekte Nährboden für Missverständnisse. In unserem Leitfaden können Sie nachlesen, was tatsächlich hinter den 10 hartnäckigsten Gerüchten über die Website-Sicherheit steckt.
Tags : website security myths, customer protection, ever-changing threats, website security, security
     Thawte
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics