RSS feed Get our RSS feed

News by Topic

customer data

Results 1251 - 1275 of 1275Sort Results By: Published Date | Title | Company Name
By: Ecora Software     Published Date: Aug 15, 2007
Do you need to implement corporate policies regarding security and confidential health information? Learn: How to use IT documentation to prepare for and pass Security audits; What IT data is critical for Security Standards; What is the difference between Security and IT Audits. You can implement a sustainable HIPAA Security Standard – Read this paper to learn more.
Tags : hipaa, hippa, health care, healthcare, compliance, privacy, consumer data, data privacy
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
A summary of the background of GLBA, the precedents it sets for securing nonpublic consumer information, and the responsibilities it places on senior management and IT departments to ensure customer data is safeguarded.
Tags : gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
     Ecora Software
By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
     Ecora Software
By: Microsoft Dynamics     Published Date: Jul 09, 2007
When White Pass & Yukon Route Railroad recast its business model, revenues gained speed, but the cumbersome UNIX system labored through long lines of customers, discouraged timely reporting, and imprisoned data behind arcane rules and menus.  Find out what WP&YR did to help increase sales 13 percent, clear out slow-moving items, save steps and stoke the profit engine.
Tags : unix, tourism, profitability, retail management, microsoft, microsoft retail management, dynamics, point-of-sale
     Microsoft Dynamics
By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability
     GFI
By: GFI     Published Date: Jul 09, 2007
This white paper highlights why organizations need to implement event log auditing as an integral part of their security policy to meet industry standards such as the Payment Card Industry Data Security Standard (PCI DSS).
Tags : security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability
     GFI
By: Tripwire     Published Date: Jul 05, 2007
Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.
Tags : compliance, pci, payment card, credit card, customer privacy, consumer privacy, consumer data, customer data
     Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Informatica     Published Date: Apr 16, 2007
David Loshin, consultant and author talked to Karen Hsu about Informatica's data quality, unstructured data and data governance solutions. Karen highlighted customers like Navteq and Humberside Police's innovative use of Informatica.
Tags : b-eye, business intelligence, data integration, karen hsu, interview, informatica, crm, customer relationship management
     Informatica
By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales
     VisiStat
By: CommercialWare     Published Date: Mar 06, 2007
Customers enjoy buying and receiving gift cards. The new challenge is for retailers to provide gift cards that mesh with the way customers want to use the cards. Many early systems cannot efficiently support the changes in demand.
Tags : customer service, customer interaction service, customer relationship management, gift cards, datavantage, commercialware, ebusiness
     CommercialWare
By: CommercialWare     Published Date: Feb 28, 2007
This paper explores what cross-channel transparency looks like through the consumer's eyes, the costs retailers incur by maintaining the status quo, and key steps retailers need to consider as they undertake cross-channel initiatives.
Tags : as/400, web sphere, customer relationship management, customer service, ebusiness, enterprise software, supply chain management, manufacturing
     CommercialWare
By: Infor     Published Date: Feb 27, 2007
Infor Discrete Manufacturing Essentials are built exclusively for discrete manufacturers, with specific functionality that addresses the industry's essential challenges. The result? For one typical Infor customer, a 50 percent reduction in data processing costs and fully automated management of more than 11,000 items and 200 suppliers.
Tags : supply chain management, enterprise resource planning, erp, scm, enterprise performance management, supplier relationship, customer relationship management, infor
     Infor
By: Siperian     Published Date: Jan 24, 2007
Discover the essential steps to delivering a solid business case for the right customer-centric MDM architecture and achieve maximum ROI.
Tags : roi, data management, return on investment, master data management, mdm, data integration, data quality, siperian
     Siperian
By: Response Media     Published Date: Jan 23, 2007
Over the last 10 years of optimizing online media campaigns, Response Media has established some best practices for profitable, successful email address acquisition and email database growth. Download this brief now to learn their key strategies.
Tags : email marketing, deliverability, list buying, list rental, email addresses, search marketing agencies, interactive marketing
     Response Media
By: TowerData     Published Date: Jan 20, 2007
Visitors to your website are valuable leads and capturing their contact information is essential to converting them to customers. However, when prospects enter email addresses and phone numbers into a web form they often make mistakes, such as misspellings and typos, or they falsify data, which prevents you from being able to contact them.
Tags : email list, email append, email address, cass, customer database, tower data, database, data quality
     TowerData
By: IBM     Published Date: Dec 12, 2006
This white paper will define different vendor approaches to developing business services and the relative cost implications of each approach for the customer. 
Tags : service oriented architecture, soa, customer data integration, cdi, best practices, data integration, service-oriented architecture, customer interaction service
     IBM
By: IBM     Published Date: Dec 12, 2006
The purpose of this paper is to highlight the issues, requirements, and technologies available for automated advanced name recognition.
Tags : business process automation, data integration, data quality, information management, customer service, data management, enterprise software, contact management
     IBM
By: IBM     Published Date: Dec 12, 2006
This paper gives the reader an overview of the functionality of IBM's WebSphere Customer Center, and explains why IBM is the strategic partner that more Fortune 500 companies select as their strategic platform for Customer Data Integration.
Tags : cdi, customer data integration, data management, data integration, customer service, customer interaction service, websphere, name matching
     IBM
By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : compliance, privacy, pci, hipaa compliance, consumer privacy, customer privacy, data protection, database security
     NetIQ Corporation
By: Customer Chemistry     Published Date: Nov 14, 2006
Read this white paper to learn about the six keys to a structured approach to planning and implementation of a predictive analytics infrastructure.  Find out how you can turn customer intelligence data into actionable information for improving the accuracy, efficiency and success of your targeting efforts.
Tags : customer intelligence, business intelligence, marketing intelligence, customer research, predictive analytics, analytics, infrastructure, customer data
     Customer Chemistry
By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
Start   Previous    37 38 39 40 41 42 43 44 45 46 47 48 49 50 51     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics