Customer RiskWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Customer Risk returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Load, Stress & Performance Testing
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Customer Service (General)
 •   Hard Drives
 •   Automated Security Auditing/ Source Code Analysis
 •   Customer Experience Management (CEM)
 •   Vulnerability Assessment

Related Searches
 •   Architecture Customer
 •   Canada Customer
 •   Customer Charts
 •   Customer Risk Downloads
 •   Customer Risk Knowledge
 •   Customer Risk Records
 •   Customer Risk Summary
 •   Designers Customer Risk
 •   Regional Customer Risk
 •   Work Customer Risk
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..

Keep Your Hard Drive by Dell, Inc.

January 09, 2009 - (Free Research)
The Keep Your Hard Drive service puts Dell customers in complete control of their data and hard drive disposal, while preserving all the benefits of the Dell Limited Warranty on Failed Hard Drives. 
(DATA SHEET) READ ABSTRACT |

Barclays Application Security Assurance Project by Veracode, Inc.

February 17, 2011 - (Free Research)
As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector. 
(CASE STUDY) READ ABSTRACT |

Optimize Data Management for Smarter Banking and Financial Markets E-Book by IBM

March 18, 2011 - (Free Research)
This e-book explains how smarter banks can anticipate customer needs and deliver innovative products faster, more consistently and more nimbly than the competition. They have full visibility of their risk position and customer needs. And they respond quickly to both challenges and opportunities. Read on to learn how to become a smarter bank. 
(EBOOK) READ ABSTRACT |

Saving At-Risk Customers and Revenue Through Survey Action Management by MarketTools, Inc.

November 24, 2009 - (Free Research)
Read this white paper to understand what Survey Action Management is and how it can help your organization effectively address customer concerns, save at-risk customers, and build customer satisfaction and loyalty. 
(WHITE PAPER) READ ABSTRACT |

Protecting Customer Data: Moving Beyond Compliance by Voltage Security, Inc.

March 29, 2012 - (Free Research)
The insurance industry has experienced unprecedented levels of change that has driven the need to secure customer and corporate data – beyond what is required for NAIC compliance. This resource offers key guidance for tackling the security challenges of this changing environment and how to ensure comprehensive data protection. 
(WHITE PAPER) READ ABSTRACT |

Controlling High Fraud Risk of International Transactions iovation Reputation Services by iovation, Inc.

March 2008 - (Free Research)
Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers. 
(WHITE PAPER) READ ABSTRACT |

Smarter quality management: The fast track to competitive advantage by IBM

November 2011 - (Free Research)
A practical approach to quality management (QM) that helps reduce time to market without sacrificing quality in the outcome. 
(WHITE PAPER) READ ABSTRACT |

From Transaction to Action -- How Business Events Processing is Helping Banks to Improve Business Transactions by IBM

March 2011 - (Free Research)
Numerous technological advances, including ATMs, credit cards and online banking, have significantly altered the ways in which the banking industry conducts its business. Read this white paper to learn how business event processing (BEP) can help create tailored systems to enhance customer service. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 20 November 2012: Inside the £65m datacentre supporting Tesco's online strategy by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we visit the £65m datacentre that sits at the heart of Tesco's ambitious online strategy. Government has approved the iPhone for use by Whitehall officials – we assess the risks. And the CIO at British Gas talks about how IT transformed the firm's customer service. Read the issue now. 
(EZINE) READ ABSTRACT |

Helping CRM Serve Its Purpose: How to Reduce the Increasingly Complex Risks That Threaten ROI by OnDemand Software

April 2008 - (Free Research)
This white paper briefly highlights CRM's recent evolution, examines the risks that accompany those developments and most important identifies the capabilities contained in an effective synchronized content development platform. 
(WHITE PAPER) READ ABSTRACT |

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk by Websense, Inc.

July 2011 - (Free Research)
Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security. 
(WHITE PAPER) READ ABSTRACT |

Cyber Security Tips from a Customer like You by Palo Alto Networks

December 2013 - (Free Research)
In this webcast, see how your peers are systematically mitigating cybersecurity risks by prioritizing network protection. Click now to explore a network security platform that can help you achieve top defense. 
(WEBCAST) READ ABSTRACT |

Reducing the Risks of Social Media by SearchSecurity.com

November 2013 - (Free Research)
Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media. 
(EGUIDE) READ ABSTRACT |

How BI Technology is Improving Risk Management by IBM

January 2014 - (Free Research)
Access the following case study to reveal how Argos Risk used a business intelligence and analytics solution to help distinguish and alleviate risk. Not only that, discover how they also were able to drive higher business value with their data and what you can do to achieve similar results. 
(CASE STUDY) READ ABSTRACT |

Santam Insurance boosts customer service and beats fraud by IBM

July 2013 - (Free Research)
Santam, South Africa's largest short-term insurance company, needed a way to identify risks and accelerate claims settlement. Consult this resource to find out how predictive analytics helped asses the risk of fraud and improved the service to customers. 
(WHITE PAPER) READ ABSTRACT |

8 Traits of IT-Friendly Contact Center and Web Customer Service Software by eGain Communications Corp.

May 2010 - (Free Research)
In this white paper, we discuss eight IT-friendly software traits that minimize risk, maximize ROI, and encourage innovation. Although the focus of this paper is on contact center and web customer service software, the discussion is broad enough to be a valuable guide for any technology investment. 
(WHITE PAPER) READ ABSTRACT |

Critical Technologies for Compliance & Risk Management for Medical Device Companies by Siperian, Inc.

February 2009 - (Free Research)
Building the foundation for a sound master data management program is critical to the success of any compliance effort. The ten requirements in this paper will enable you to identify a suitable technology platform - a prerequisite when managing your organization's master data assets & critical to establishing a consistent master data foundation. 
(WHITE PAPER) READ ABSTRACT |

Smarter Customers, Smarter Commerce: Innovations in the Banking Industry by IBM

April 2012 - (Free Research)
Banks today must reassess their business models and focus more on efficiency, data collection and risk management in order to stay competitive. Uncover a unique framework that can help meet your business objectives and allow for better data management in the highly regulated financial industry. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk Management and Compliance (GRC) by ComputerWeekly.com

February 2014 - (Free Research)
Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. 
(ANALYST REPORT) READ ABSTRACT |

The Cloud Risk Framework by ComputerWeekly.com

June 2012 - (Free Research)
This unique cloud framework is designed to help organisations assess the financial risks of moving to the cloud. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Risk and Compliance Outlook by McAfee, Inc.

November 2011 - (Free Research)
Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk. 
(WHITE PAPER) READ ABSTRACT |

Controlling Risk Through Software Code Governance by Coverity

July 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Report Management: A Market Assessment by IBM

September 2008 - (Free Research)
This white paper from AIIM International is based on findings from a recent survey conducted by AIIM on enterprise report management (ERM). 
(WHITE PAPER) READ ABSTRACT |

Security Virtual Jam Session: The Secured Enterprise by IBM

February 2008 - (Free Research)
Join IBM Security Executives for an informative session on the current security landscape, the requirements for a new approach to securing the enterprise, and a rare live Q&A session with IBM security leaders. 
(WEBCAST)

An insurance firm eases regulatory compliance while reducing risk by IBM

September 2013 - (Free Research)
Learn how an insurance firm worked with IBM to ease its regulatory compliance while reducing risk. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts