E-Commerce Security PrioritiesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: E-Commerce Security Priorities returned the following results.
RSS What is RSS?
Related Categories

 •   Customer Relationship Management (CRM)
 •   Data Security
 •   Customer Experience Management (CEM)
 •   Customer Interaction Management
 •   Customer Information Management/ Customer Databases
 •   Customer Service (General)
 •   Network Security
 •   Integrated E-Commerce Solutions
 •   Business to Consumer Web Commerce
 •   Security Policies

Related Searches
 •   Decision E-Commerce Security
 •   E-Commerce Security Market
 •   E-Commerce Security Priorities Consults
 •   E-Commerce Technical
 •   E-Commerce Trends
 •   Pricing E-Commerce Security Priorities
 •   Reporting E-Commerce Security
 •   Schedule E-Commerce Security
Advertisement

ALL RESULTS
1 - 25 of 456 | Next Page

Featured Sponsors

Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Forging a CEM Strategy by SearchCRM

August 28, 2013 - (Free Research)
Shoppers are looking for more personalized, responsive, relevant experiences, and in order to provide that, your business needs an effective customer experience management (CEM) strategy. Learn how when you access this expert three-part e-guide and discover six top concepts that make up a successful CEM strategy. 
(EGUIDE) READ ABSTRACT |

How SSL and TLS Secure Network Transactions by GeoTrust, Inc.

December 20, 2012 - (Free Research)
This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Forging a CEM Strategy That Can Power Commerce by SearchCRM

April 22, 2014 - (Free Research)
With a seemingly exhaustive number of methods to communicate -- not to mention an expected $280 billion in U.S. e-commerce sales in 2015 -- contact center technology today requires a new approach. 
(EBOOK) READ ABSTRACT |

CRM in Financial Services: Best practices, trends and strategy for the new economy by Pivotal CRM, a CDC Software solution

November 23, 2010 - (Free Research)
Find out how financial services companies are leveraging CRM technology and best practices to improve service and operational efficiency. Read this e-book to learn more. 
(EBOOK) READ ABSTRACT |

How to Fine-Tune your Contact Center by SearchCRM

August 07, 2013 - (Free Research)
With call center software, best business practices can be difficult to navigate. But the payoff is worth investigating. In this handbook, readers find detailed explanations of the latest call center technologies as well as insight on call center management—including schedule and workforce management. 
(EGUIDE) READ ABSTRACT |

Let Customer Feedback Do the Driving by SPSS Inc. Worldwide Headquarters

May 31, 2007 - (Free Research)
As the second installment in The Customer Innovation Series, this paper describes why and how Enterprise Feedback Management (EFM) is a critical component in solving the problem of enhancing customer-driven innovation. 
(WHITE PAPER) READ ABSTRACT |

Who Are My Best Customers? by SPSS Inc. Worldwide Headquarters

February 20, 2009 - (Free Research)
Who are my best customers? If you manage sales, marketing, or customer service, you want an answer to that. That's because implementing successful strategies for every customer segment is critical to increasing business profits. This paper describes just a few of the ways that you can use analytics to better understand your customers. 
(WHITE PAPER) READ ABSTRACT |

Harnessing Social Media to Boost the Bottom Line by SearchCRM

August 29, 2013 - (Free Research)
Launching a social CRM strategy? It's a good idea, but be careful not to overdo it. Get the keys to effective social CRM. 
(EBOOK) READ ABSTRACT |

Mobile apps reach the busy customer by SearchCRM

March 19, 2013 - (Free Research)
In this expert e-zine, discover two key areas of app development in today's mobile climate: delivering quality mobile customer service, and uniting front-end and back-end functionality. Also included is a case study of a mobile app that delivered user-oriented, ultra-simple service with outstanding results. 
(EZINE) READ ABSTRACT |

3-2-1 Contact the Call Center by SearchCRM

January 31, 2013 - (Free Research)
Contact centers can't live in the past. This three-part handbook offers insight into how contact centers can modernize an agent's tools to meet the demands and needs of customers whose mobile and social empowerment has put companies in the virtual hot seat. 
(WHITE PAPER) READ ABSTRACT |

Customer Experience Exchange, Issue 7 by SearchCRM

November 13, 2012 - (Free Research)
This 3-article E-Zine offers analysis and advice for the CEM professional. In the featured article, Cameron Kittle reviews CEM technologies and shares the thoughts of industry observers who stress that a company should first know what it intends to do with its wired connection to customers. Continue on for this article and more. 
(EZINE) READ ABSTRACT |

Customer Experience Exchange E-Zine Issue 2 by SearchCRM

January 31, 2012 - (Free Research)
This second issue of Customer Experience Exchange highlights the contact center. Often an overlooked facet of customer relationship management (CRM), the contact center is usually the first way a customer reaches out to a company and thus should always be considered in CRM strategies. 
(EZINE)

Business Value of Sterling Commerce Managed Services for B2B Integration by Sterling Commerce, An IBM Company

September 01, 2009 - (Free Research)
Increasing cost controls and unpredictable cost increases are leading many enterprises to rethink how they support their business-to-business (B2B) operations. As a result, many enterprises are choosing to outsource B2B integration by partnering with a managed services provider. 
(WHITE PAPER) READ ABSTRACT |

What if? Unleashing the Potential of Digital Signage by Insight

December 21, 2012 - (Free Research)
In this presentation transcript, Principle Analyst Zeus Kerravala of ZK Research reveals the secrets of utilizing digital signage to its fullest potential. Learn the transformations this technology has gone through, where it's going, and how businesses have successfully leveraged its power. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 24, 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Server-Gated Cryptography: Providing Better Security for More Users by Thawte Inc.

May 10, 2013 - (Free Research)
Discover how Server-Gated Cryptography (SGC)-enabled SSL certificates are crucial to protecting your organization and your end-users in the threat-filled vastness of cyberspace. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 7 February 2012: IT investment priorities by ComputerWeekly.com

February 07, 2012 - (Free Research)
In this week’s Computer Weekly, we examine exclusive research into the investment priorities of UK IT decision-makers, which shows virtualisation, Windows 7 and security as the top areas for spending this year. We analyse the changing nature of database architecture; and the BBC’s Chief Technology Officer talks about IT plans for the broadcaster. 
(EZINE) READ ABSTRACT |

Special Report on Adobe by ComputerWeekly.com

February 24, 2014 - (Free Research)
This special 7-page report from Computer Weekly, updated for 2014, analyses the challenges facing Adobe, its financial performance, the services and products it offers, its place in the IT market and its future strategy. 
(IT BRIEFING) READ ABSTRACT |

Harvey Nash CIO Survey 2012 by ComputerWeekly.com

May 14, 2012 - (Free Research)
CIOs are more confident of securing technology budget increases than at any time in the last five years, according to the CIO Technology Survey 2012. 
(IT BRIEFING) READ ABSTRACT |

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Banca Intesa Counters Threats with HP ArcSight by Hewlett-Packard Limited

March 2013 - (Free Research)
Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure. 
(CASE STUDY) READ ABSTRACT |

European cross-border e-commerce by ComputerWeekly.com

January 2012 - (Free Research)
European consumers' growing use digital channels as part of their shopping experience is driving retailers’ focus on delivering efficient online, cross-border operations in Europe, this research report from Accenture reveals. 
(IT BRIEFING) READ ABSTRACT |

The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success by Breach Security

June 2009 - (Free Research)
This resource provides IT security professionals with the information needed to understand PCI compliance and specifically, one of the standard's latest requirements, 6.6. In addition, the paper offer tips for successful PCI 6.6 compliance and highlights compliance successes from real-world companies. 
(WHITE PAPER) READ ABSTRACT |

E-Book: How to keep customers -- and keep them happy: High-return tactics for building customer loyalty by Microsoft

October 2011 - (Free Research)
This ebook is full of expert advice for implementing a successful customer experience management (CEM) plan. 
(EBOOK)

Business-Critical Benefits of Workload Automation Solutions by ASG Software Solutions

February 2010 - (Free Research)
Enterprises have struggled with workload automation (WLA) implementation because of its complexities, dependencies, and costs. These obstacles existed primarily because WLA was simply not a mature technology. However, today WLA solutions are widely accessible and achievable. Read this paper to learn about the latest innovations. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 456 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts