RSS feed Get our RSS feed

News by Topic

customer protection

Results 1 - 25 of 68Sort Results By: Published Date | Title | Company Name
By: Cloudian     Published Date: Feb 15, 2018
Not so long ago, if you asked a business executive, “what is the most irreplaceable part of your business?” they might have pointed at their building or their employees. The really forward-thinking execs may have chosen their customers. But the reality is that businesses have insurance to deal with the loss of a building; they can hire new employees; and they can acquire new customers. The one thing that is truly irreplaceable is their data. Lose that and you really are out of business. The potential risks to your data can be as subtle as the malfunction of tiny areas on a disk drive or as enormous as the failure of an entire data center. That means it’s not enough just to protect your data — you must also select the best way to protect it. To deliver that protection in an economical and rapidly recoverable way requires a system that gives you complete control to determine levels of data protection based on the type of data. In this paper, we’ll talk about the science of data protect
Tags : 
     Cloudian
By: SAS     Published Date: Apr 25, 2017
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
     SAS
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn
     Trend Micro, Inc.
By: Akamai Technologies     Published Date: Nov 13, 2018
Competitive pressures from peers are forcing CSPs to evolve beyond connectivity and offer incremental valueadded services to sustain revenue growth. Security services are an obvious candidate for consideration since awareness of the need for security protections is extremely high due to regular media coverage highlighting Internet exploits. Threat trends and strong alignment with large customer segments are creating opportunity for CSPs to offer a foundational layer of web protection for every Internet access connection. They can provide a previously unavailable level of web security that reduces the risk their customers face, without imposing a configuration or management burden.
Tags : 
     Akamai Technologies
By: Thawte     Published Date: Oct 05, 2015
As online attacks become more frequent and easier to execute, organisations around the world are under increasing scrutiny to ensure all online transactions involving confidential data are secure. Companies who are serious about protecting their customers and their business reputation will implement Always On SSL that helps protect the entire user experience from start to finish, making it safer to search, share and shop online. Discover more about this best practice protection by downloading our new reference guide now.
Tags : always on ssl, online protection, confidential data, user experience, customer protection, security
     Thawte
By: Thawte     Published Date: Oct 05, 2015
L’heure est à la sécurisation intégrale de votre site. Face à des attaques de plus en plus fréquentes et faciles à exécuter, les internautes sont plus que jamais attentifs à la capacité des sites à sécuriser leurs données confidentielles. Pour les entreprises intraitables sur les questions de réputation et de protection de leurs clients, Always-On SSL s’impose comme une priorité absolue. Sa mission : protéger les internautes tout au long de leur parcours sur votre site – des recherches aux achats, en passant par le partage d’informations. Pour en savoir plus sur ce dispositif de renforcement de la protection en ligne, téléchargez notre nouveau guide de référence.
Tags : always on ssl, online protection, confidential data, user experience, customer protection, security
     Thawte
By: Thawte     Published Date: Oct 05, 2015
Es ist an der Zeit, sich für durchgängige Website-Sicherheit zu entscheiden. Da Online-Angriffe immer häufiger und einfacher werden, sind Unternehmen in aller Welt zunehmend auf dem Prüfstand und müssen zeigen, dass alle Online-Transaktionen mit vertraulichen Daten sicher sind. Unternehmen, die den Schutz ihrer Kunden und ihrer Marke ernst nehmen, implementieren Always-On SSL, um die Suche, den Meinungsaustausch und das Einkaufen im Internet sicherer zu machen. Mit Always-On SSL sind alle Kundeninteraktionen vom ersten bis zum letzten Klick geschützt. Informieren Sie sich ausführlich über diesen Schutz in unserem Leitfaden.
Tags : always on ssl, online protection, confidential data, user experience, customer protection, security
     Thawte
By: Quocirca     Published Date: Feb 05, 2008
The financial services industry deals with a commodity that is primarily electronic — money. Consequently it spends more per employee on IT than any other industry.  Despite this, there is a worrying tendency for information that should be confidential to end up in the public domain. Why is this and what can be done?
Tags : quocirca, bank, banks, financial services, finserve, finserv, network security, customer data
     Quocirca
By: AWS     Published Date: Dec 19, 2018
There is no doubt that customers want to protect their environment against unplanned downtime. But what happens when disasters do occur? Download this webinar for a deep dive into the VMware Cloud on AWS Disaster Recovery (DR) use case. Experts from VMware and AWS jointly discuss the disaster recovery challenges that customers often face and detail how you can leverage VMware Cloud on AWS to overcome them. See demos of how you can use VMware Cloud on AWS for your DR scenario and hear from current customers. Download our webinar to learn The benefits of Disaster Recovery-as-a-Service (DRaaS), delivering on-site protection How automated orchestration accelerates failover and failback capabilities The ways DRaaS simplifies and modernizes your existing DR solutions What VMware Cloud on AWS DRaaS does to help reduce costs, simplify operations, and quicken recovery times
Tags : 
     AWS
By: Citrix Systems     Published Date: Jul 25, 2016
NetScaler MobileStream™ technology from Citrix enables enterprises to do more than simply get by when it comes to the performance and security of mobile workspaces. Building on the gains derived from the core set of NetScaler functionality, NetScaler MobileStream combines a suite of multi-layer optimizations purpose-built to accelerate mobile service delivery with an essential collection of secure access and threat protection capabilities for mobile computing. The result is a unified solution that not only provides the peace of mind IT needs but also delivers the exceptional mobile experience your employees, customers and partners deserve. Put another way, the result with NetScaler MobileStream is a dramatic improvement in mobile service performance and protection that makes Citrix NetScaler® the world’s fastest and most secure delivery platform for mobile workspaces.
Tags : 
     Citrix Systems
By: Thawte     Published Date: Oct 05, 2015
En matière de protection de vos clients et de votre site Web, le savoir reste votre meilleure arme. Toutefois, face à l’évolution constante des menaces et des moyens de défense, certaines idées reçues ont la vie dure. Pour vous aider à y voir plus clair et à différencier le mythe de la réalité, Thawte vous invite à visionner ce guide essentiel.
Tags : website security myths, customer protection, ever-changing threats, website security, security
     Thawte
By: Thawte     Published Date: Oct 05, 2015
Wenn Sie Ihr Unternehmen und Ihre Kunden vor Angriffen schützen wollen, sollten Sie mit Wissen gewappnet sein. Das ist jedoch nicht einfach, denn die sich ständig ändernde Bedrohungslage und die kontinuierliche Weiterentwicklung der Abwehrmaßnahmen sind der perfekte Nährboden für Missverständnisse. In unserem Leitfaden können Sie nachlesen, was tatsächlich hinter den 10 hartnäckigsten Gerüchten über die Website-Sicherheit steckt.
Tags : website security myths, customer protection, ever-changing threats, website security, security
     Thawte
By: Entrust Datacard     Published Date: May 10, 2017
Entrust Datacard provides customers with a commercial security public key infrastructure (PKI) solution that addresses authentication and data protection needs for enterprise and government customers
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
     Entrust Datacard
By: Riverbed     Published Date: Feb 26, 2015
In order to be successful today, operations teams require complete application-level visibility across the entire environment.
Tags : customer relationship management, security, human resources, sales force automation, application integration, data protection, network performance
     Riverbed
By: MobileIron     Published Date: Aug 20, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages: • A single app of threat protection is fully integrated with EMM. • No user action is required to activate or update on-device security. • Advanced mobile security blocks known and zero-day threats across iOS and Android devices with no Internet connectivity required. • Machine-learning algorithms instantly detect and remediate on-device DNA threats.
Tags : mobile, threat, defense, strategy, mobileiron, innovation
     MobileIron
By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
     Entrust Datacard
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: • Decreased incident response time from days to minutes through automation, enabled by the Investigate API • Reduction in network security incidents and infected endpoints • Increased protection against malware, ransomware, and other threats on and off the network • Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
     Cisco Umbrella EMEA
By: HPE Intel     Published Date: Mar 15, 2016
Led by experienced technology consultants, Hewlett Packard Enterprise Storage Transformation Workshop Service provides a highly interactive, meaningful half day-long session with a customer's IT, business, and executive stakeholders. Using a series of high-quality (slide-free) discussion panels, HPE TS Consulting will facilitate an exploration of data management transformation journey to business-aligned visions, aligning your specific situation and HPE’s experiences over evolutionary trends in Data Management, Transformation to All Flash and End to End Data Protection. HPE consultants will also lead discussions on the potential implications that a data management transformation may present to IT, your storage and backup staff, and your business.
Tags : 
     HPE Intel
By: Akamai Technologies     Published Date: Sep 11, 2017
How safe is your customer's sensitive data? Is your organization protected from credential stuffing? Take Akamai's interactive security quiz and discover more about credential stuffing and how to protect your business.
Tags : customer security, credential protection, akamai
     Akamai Technologies
By: Tripwire     Published Date: Jul 05, 2007
Learn how to align PCI compliance with business processes for a more streamlined and reliable IT infrastructure with this whitepaper from the IT Compliance Institute.
Tags : compliance, pci, payment card, credit card, customer privacy, consumer privacy, consumer data, customer data
     Tripwire
By: SAS     Published Date: Apr 04, 2018
This white paper, sponsored by SAS, examines the interplay between the challenges and opportunities afforded by the growing breadth of digital channels offered by financial institutions. Mobile wallets, real-time peer-to-peer (P2P), and digital account opening all require the right mix of security solutions, background analytics, and personnel to balance positive customer experience with robust fraud protection. JAVELIN independently produced this whitepaper and maintains complete independence in its data collection, findings, and analysis.
Tags : 
     SAS
By: Ecessa Corporation     Published Date: Mar 11, 2009
To achieve greater productivity, employees at headquarters, telecommuters, business partners and customers must all have unhindered access to critical applications. Any delay in delivering these applications can cause user productivity to suffer and adversely affect business profitability. WAN link controllers are an affordable solution for ensuring the optimum performance, reliable delivery and protection of applications. They optimize network bandwidth and ensure the delivery of critical applications. Download this white paper to learn how to achieve efficiencies and competitive advantages through the adoption of affordable, yet feature-rich WAN link controllers.
Tags : adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
     Ecessa Corporation
By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn about the key challenges of PCI DSS v1.1 and how NetIQ Security Management, Configuration Control and Enterprise Administration solutions can help you demonstrate PCI compliance.
Tags : pci, pci dss, compliance, credit card, payment card, pci compliance, customer privacy, privacy
     NetIQ Corporation
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics