Loss Prevention Customer Service SurveysWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Loss Prevention Customer Service Surveys returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Endpoint Security
 •   Network Security
 •   Intellectual Property Protection/ Extrusion Prevention
 •   Security Policies
 •   Intrusion Prevention Solutions
 •   Security Monitoring
 •   Managed Security Services
 •   Application Security

Related Searches
 •   Download Loss Prevention
 •   Industries Loss Prevention
 •   Licenses Loss Prevention
 •   Loss Data
 •   Loss Hardware Provider
 •   Loss Prevention Customer Indiana
 •   Loss Products
 •   Loss Protocol
 •   Loss Starting
 •   Open Loss
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Outbound Email And Data Loss Prevention In Today's Enterprise, 2009 by Proofpoint, Inc.

August 11, 2009 - (Free Research)
The convenience and ubiquity of email as a business communications tool has exposed enterprises to a wide variety of legal, financial and regulatory risks associated with outbound email. This report summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. 
(WHITE PAPER) READ ABSTRACT |

Data Loss Prevention Survey by Symantec Corporation

April 02, 2009 - (Free Research)
Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways. 
(ASSESSMENT TOOL)

Outbound Email and Data Loss Prevention in Today's Enterprise by Proofpoint, Inc.

May 01, 2008 - (Free Research)
This white paper overviews a survey completed by Proofpoint and Forrester Consulting that analyzes the legal, financial, and regulatory risks associated with outbound email in large enterprises. 
(WHITE PAPER) READ ABSTRACT |

Outbound Email and Data Loss Prevention in Today’s Enterprise, 2010 by Proofpoint, Inc.

September 08, 2010 - (Free Research)
This report summarizes the findings of Proofpoint’s seventh annual survey of enterprise attitudes about outbound email, content security and data protection. Its goal is to help raise awareness of the policy, technology and cultural issues surrounding email and Web monitoring, data protection and information leaks. 
(WHITE PAPER) READ ABSTRACT |

Cisco Continuous Data Protection for Files by Cisco Systems, Inc.

March 25, 2009 - (Free Research)
Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software. 
(WHITE PAPER) READ ABSTRACT |

Information security breaches survey 2012 by ComputerWeekly.com

April 24, 2012 - (Free Research)
Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey. 
(IT BRIEFING) READ ABSTRACT |

The Executive Guide to Data Loss Prevention by Websense, Inc.

August 18, 2009 - (Free Research)
Data Loss Prevention is designed to protect information assets with minimal interference in business processes. It provides new insights into how information is used, and enforces protective controls to prevent unwanted incidents. Read on to learn how DLP can reduce risk, improve data management practices, and even lower certain compliance costs. 
(WHITE PAPER) READ ABSTRACT |

Data Loss Prevention Requirements Roadmap by CA Technologies.

April 14, 2009 - (Free Research)
The technologies that aid a successful company in sharing digital information and maintaining swift communications also leave companies vulnerable to a variety of security risks. Read this paper to learn how a comprehensive data loss prevention solution can protect your company's sensitive data. 
(WHITE PAPER) READ ABSTRACT |

Mobile: The Technology Game-Changer in 2013 by SearchSecurity.com

February 28, 2013 - (Free Research)
TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization. 
(EGUIDE) READ ABSTRACT |

Flushing Bank Invests in Internet Security with Webroot by Webroot

September 27, 2011 - (Free Research)
New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers. 
(CASE STUDY) READ ABSTRACT |

Data Loss Prevention for IBM i by Innovatum, Inc.

April 16, 2010 - (Free Research)
Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization. 
(WHITE PAPER) READ ABSTRACT |

2010 SMB Information Protection Survey by Symantec by Symantec Corporation

June 23, 2010 - (Free Research)
This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing. 
(WHITE PAPER) READ ABSTRACT |

Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands by Symantec Corporation

October 2008 - (Free Research)
Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions. 
(WHITE PAPER) READ ABSTRACT |

Ten Steps to Protecting Your Sensitive Data by McAfee.

December 2010 - (Free Research)
Data loss prevention has become a major focus for companies of all sizes. One reasonis for this is mobile employees carry an increasingly large collection of sensitive data. How can you protect your organization's sensitive data from loss or theft? Read these ten steps. 
(ANALYST BRIEF) READ ABSTRACT |

Fraud Prevention and Detection for Credit and Debit Card Transactions by ILOG, an IBM Company

April 2008 - (Free Research)
This white paper examines credit card fraud and details business rules-based fraud prevention and detection. 
(WHITE PAPER) READ ABSTRACT |

Symantec 2011 SMB Disaster Preparedness Survey by Symantec Corporation

January 2011 - (Free Research)
For the second year, Symantec’s SMB Disaster Preparedness Survey revealed that SMBs are not taking disaster preparedness for their computer and networking systems as seriously as they should. Read this survey and analysis to learn more. 
(WHITE PAPER) READ ABSTRACT |

Data Loss Prevention from the Inside Out by Cisco Systems, Inc.

June 2008 - (Free Research)
In this Techwise TV episode learn about data loss prevention and the three primary loss vectors that you must assess for your organization. 
(VIDEOCAST) READ ABSTRACT |

Mobile Device Data Protection: Key Findings and Players in the Market by SearchSecurity.com

June 2013 - (Free Research)
This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint. 
(EGUIDE) READ ABSTRACT |

Demystifying Data Loss Prevention: Requirements for Comprehensive Protection by DynTek Inc. and McAfee

May 2008 - (Free Research)
Learn how Data Loss Prevention technology provides unprecedented visibility intohow data is used, and by whom, why, and when. With this insight, you can define and enforce data usage policies that help prevent both accidental and malicious data loss. 
(WHITE PAPER) READ ABSTRACT |

Security Appliances: New Strides in Preventing Intrusions by IBM

February 2009 - (Free Research)
According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff. 
(WHITE PAPER) READ ABSTRACT |

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by Websense, Inc.

July 2008 - (Free Research)
Today's threats use Web 2.0 to integrate daily operations which has changed the requirements for web security, email security and data loss prevention. Download this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Taming the beast: Data protection in 2014 & beyond by TechTarget

March 2014 - (Free Research)
In this epic time of data breaches, are you doing enough to ensure protection? By contributing to this brief, 5 minute survey, you'll gain immediate access to an expert resource on top data protection tips that will help you answer that question and establish an effective security strategy for the future. 
(RESOURCE)

How to Implement a Data Loss Prevention Strategy by Sophos, Inc.

April 2010 - (Free Research)
This paper guides IT professionals through the steps necessary to implement a practical data loss prevention (DLP) strategy. It starts off by looking at what’s driving data loss prevention, the consequences of data loss, and a possible solution. It then moves on to practical implementation advice and examples. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Symantec 2010 SMB Information Protection Survey by Symantec Corporation

November 2010 - (Free Research)
Small and midsized businesses (SMBs) have a reputation of being somewhat lax when it comes to information protection. Symantec’s last SMB survey, for example, showed a high percentage of SMBs had failed to enact even the most basic protections- Which is why this year’s SMB Information Protection Survey is so surprising. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

CRM guide: How social is changing the strategy by IBM

February 2014 - (Free Research)
Rapid changes in social computing, mobile and customer analytics are driving shifts in CRM strategies. This e-guide examines how businesses can prepare for the evolving CRM market and address changing customer experience needs. Discover the latest predictions for CRM trends according to analysts from Gartner Inc. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts