Risk Knowledge-Based CustomerWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Risk Knowledge-Based Customer returned the following results.
RSS What is RSS?
Related Categories

 •   Authentication / Password Management
 •   Security Policies
 •   Access Control
 •   Data Security
 •   Identity Management/ User Provisioning
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Employee Surveys/ Exit Interviews
 •   IT Portfolio Management
 •   Security Monitoring
 •   IT Training and Certification

Related Searches
 •   Accessing Risk Knowledge-Based Customer
 •   Calendar Risk Knowledge-Based
 •   Fast Risk Knowledge-Based
 •   Finding Risk
 •   Latest Risk Knowledge-Based Customer
 •   Protocol Risk Knowledge-Based Customer
 •   Risk Charts
 •   Risk Contacts
 •   Risk Data
 •   Risk Knowledge-Based Customer Company
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Presentation Transcript: Risk Mitigation – Bang for the Buck by ActivIdentity Corporation

March 21, 2011 - (Free Research)
Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Why Passwords Aren't Strong Enough: Making the Case for Strong Authentication by RSA, The Security Division of EMC

February 10, 2012 - (Free Research)
With today’s advanced threat landscape and the increased value placed on information, relying on static passwords is no longer enough. This resource explores the need to strong authentication and the ROI benefits you can gain. 
(WHITE PAPER) READ ABSTRACT |

An Information Architecture Vision by ComputerWeekly.com

June 07, 2013 - (Free Research)
The Open Group assesses the "big data" problem and offers an Enterprise Information Planning and Architecture Model to help organisations make the most of their information. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Gartner: Decide now if you will become a money-making CIO by ComputerWeekly.com

January 24, 2011 - (Free Research)
This report from Gartner describes six distinctly different styles of "money-making CIO" that are likely to evolve between 2011 and 2020. 
(ANALYST BRIEF) READ ABSTRACT |

Presentation Transcript: Changing Authentication Options by ActivIdentity Corporation

March 21, 2011 - (Free Research)
Financial services institutions and enterprises developing high-value intellectual property need to stay on the leading edge of authentication technology. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Optimize Data Management for Smarter Banking and Financial Markets E-Book by IBM

March 18, 2011 - (Free Research)
This e-book explains how smarter banks can anticipate customer needs and deliver innovative products faster, more consistently and more nimbly than the competition. They have full visibility of their risk position and customer needs. And they respond quickly to both challenges and opportunities. Read on to learn how to become a smarter bank. 
(EBOOK) READ ABSTRACT |

Saving At-Risk Customers and Revenue Through Survey Action Management by MarketTools, Inc.

November 24, 2009 - (Free Research)
Read this white paper to understand what Survey Action Management is and how it can help your organization effectively address customer concerns, save at-risk customers, and build customer satisfaction and loyalty. 
(WHITE PAPER) READ ABSTRACT |

Controlling High Fraud Risk of International Transactions iovation Reputation Services by iovation, Inc.

March 2008 - (Free Research)
Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers. 
(WHITE PAPER) READ ABSTRACT |

Protecting Customer Data: Moving Beyond Compliance by Voltage Security, Inc.

March 2012 - (Free Research)
The insurance industry has experienced unprecedented levels of change that has driven the need to secure customer and corporate data – beyond what is required for NAIC compliance. This resource offers key guidance for tackling the security challenges of this changing environment and how to ensure comprehensive data protection. 
(WHITE PAPER) READ ABSTRACT |

Helping CRM Serve Its Purpose: How to Reduce the Increasingly Complex Risks That Threaten ROI by OnDemand Software

April 2008 - (Free Research)
This white paper briefly highlights CRM's recent evolution, examines the risks that accompany those developments and most important identifies the capabilities contained in an effective synchronized content development platform. 
(WHITE PAPER) READ ABSTRACT |

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk by Websense, Inc.

July 2011 - (Free Research)
Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security. 
(WHITE PAPER) READ ABSTRACT |

How to write a RFP for Master Data Management: 10 Common Mistakes to Avoid by Siperian, Inc.

September 2007 - (Free Research)
Critical master data management (MDM) functionality can be easily overlooked when request for proposals (RFPs) are narrowly focused on a single business data type. Ensure success by avoiding 10 costly mistakes when writing your RFP. 
(WHITE PAPER) READ ABSTRACT |

Critical Technologies for Compliance & Risk Management for Medical Device Companies by Siperian, Inc.

February 2009 - (Free Research)
Building the foundation for a sound master data management program is critical to the success of any compliance effort. The ten requirements in this paper will enable you to identify a suitable technology platform - a prerequisite when managing your organization's master data assets & critical to establishing a consistent master data foundation. 
(WHITE PAPER) READ ABSTRACT |

Smarter quality management: The fast track to competitive advantage by IBM

November 2011 - (Free Research)
A practical approach to quality management (QM) that helps reduce time to market without sacrificing quality in the outcome. 
(WHITE PAPER) READ ABSTRACT |

From Transaction to Action -- How Business Events Processing is Helping Banks to Improve Business Transactions by IBM

March 2011 - (Free Research)
Numerous technological advances, including ATMs, credit cards and online banking, have significantly altered the ways in which the banking industry conducts its business. Read this white paper to learn how business event processing (BEP) can help create tailored systems to enhance customer service. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 20 November 2012: Inside the £65m datacentre supporting Tesco's online strategy by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, we visit the £65m datacentre that sits at the heart of Tesco's ambitious online strategy. Government has approved the iPhone for use by Whitehall officials – we assess the risks. And the CIO at British Gas talks about how IT transformed the firm's customer service. Read the issue now. 
(EZINE) READ ABSTRACT |

Risk and Compliance Outlook by McAfee, Inc.

November 2011 - (Free Research)
Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk. 
(WHITE PAPER) READ ABSTRACT |

Cyber Security Tips from a Customer like You by Palo Alto Networks

December 2013 - (Free Research)
In this webcast, see how your peers are systematically mitigating cybersecurity risks by prioritizing network protection. Click now to explore a network security platform that can help you achieve top defense. 
(WEBCAST) READ ABSTRACT |

Reducing the Risks of Social Media by SearchSecurity.com

November 2013 - (Free Research)
Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media. 
(EGUIDE) READ ABSTRACT |

How BI Technology is Improving Risk Management by IBM

January 2014 - (Free Research)
Access the following case study to reveal how Argos Risk used a business intelligence and analytics solution to help distinguish and alleviate risk. Not only that, discover how they also were able to drive higher business value with their data and what you can do to achieve similar results. 
(CASE STUDY) READ ABSTRACT |

Santam Insurance boosts customer service and beats fraud by IBM

July 2013 - (Free Research)
Santam, South Africa's largest short-term insurance company, needed a way to identify risks and accelerate claims settlement. Consult this resource to find out how predictive analytics helped asses the risk of fraud and improved the service to customers. 
(WHITE PAPER) READ ABSTRACT |

8 Traits of IT-Friendly Contact Center and Web Customer Service Software by eGain Communications Corp.

May 2010 - (Free Research)
In this white paper, we discuss eight IT-friendly software traits that minimize risk, maximize ROI, and encourage innovation. Although the focus of this paper is on contact center and web customer service software, the discussion is broad enough to be a valuable guide for any technology investment. 
(WHITE PAPER) READ ABSTRACT |

Controlling Risk Through Software Code Governance by Coverity

July 2011 - (Free Research)
Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain. 
(WHITE PAPER) READ ABSTRACT |

Smarter Customers, Smarter Commerce: Innovations in the Banking Industry by IBM

April 2012 - (Free Research)
Banks today must reassess their business models and focus more on efficiency, data collection and risk management in order to stay competitive. Uncover a unique framework that can help meet your business objectives and allow for better data management in the highly regulated financial industry. 
(WHITE PAPER) READ ABSTRACT |

Governance, Risk Management and Compliance (GRC) by ComputerWeekly.com

February 2014 - (Free Research)
Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth. 
(ANALYST REPORT) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts