Secure CustomerWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Customer returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Wireless Security
 •   Network Management
 •   Security Monitoring
 •   Network Security
 •   Storage Security
 •   Endpoint Security
 •   Unified Communications / Voice & Data Convergence
 •   Application Management and Maintenance
 •   Application Security

Related Searches
 •   Backups Secure Customer
 •   Device Secure
 •   Export Secure
 •   Implement Secure Customer
 •   Monitoring Secure Customer
 •   Reviews Secure Customer
 •   Secure Customer Computerized
 •   Secure Managing
 •   Secure Whitepaper
 •   Secure Wisconsin
Advertisement

ALL RESULTS
1 - 25 of 457 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 12, 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Protecting Customer Data: Moving Beyond Compliance by Voltage Security, Inc.

March 29, 2012 - (Free Research)
The insurance industry has experienced unprecedented levels of change that has driven the need to secure customer and corporate data – beyond what is required for NAIC compliance. This resource offers key guidance for tackling the security challenges of this changing environment and how to ensure comprehensive data protection. 
(WHITE PAPER) READ ABSTRACT |

Rethinking Omni-Channel Merchandise Optimization in the Connected-Customer Era by IBM

April 29, 2014 - (Free Research)
In this informative e-book, 5 key steps are highlighted to address merchandise optimization in the connected-customer era. Read on to discover how these steps will connect and optimize your merchandising and marketing activities to secure customer loyalty and future repeat sales. 
(EBOOK) READ ABSTRACT |

Virtual Private LAN Services: Extending Ethernet over the WAN by Tellabs

October 2008 - (Free Research)
This white paper includes an overview of the technical building blocks of VPLS, including a review of the MPLS features that help enable the creation of secure customer networks within a shared packet infrastructure. 
(WHITE PAPER) READ ABSTRACT |

10 Performance Management Best Practices by Gomez

January 2007 - (Free Research)
This white paper examines performance practices that represent the best chance for any organization-regardless of its size and market presence-to gain alignment and win more than its fair share of the online market opportunity. 
(WHITE PAPER) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

Practical Approaches for Securing Web Applications across the Software Delivery Lifecycle by IBM

July 2009 - (Free Research)
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don’t understand, is how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle. 
(WHITE PAPER) READ ABSTRACT |

Oracle’s Optimized Solution for CRM - A Business Case for Secured Siebel CRM on Oracle’s SPARC T-Series by Oracle Corporation

March 2011 - (Free Research)
Data privacy and thefts, contractual terms and compliance requirements are issues that all need to be considered when installing a CRM system. This paper outlines how deploying Siebel CRM on Oracle's SPARC T-Series servers mitigates risk while helping maintain a low total cost of ownership by not requiring more equipment. 
(WHITE PAPER) READ ABSTRACT |

GoToAssist Corporate - Remote Support Made Easy™ by GoToAssist

July 2010 - (Free Research)
Citrix® GoToAssist® Corporate™ is a comprehensive and secure remote support solution that helps businesses increase revenue and reduce costs while improving customer satisfaction and problem resolution times. Continue reading this product overview to learn more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Mobility - Aironet 1100 Series by Cisco Systems

The Cisco Aironet® 1100 Series delivers an affordable and upgradable 802.11b wireless LAN (WLAN) solution, setting the enterprise standard for high performance, secure, manageable, and reliable WLANs. 
(HARDWARE PRODUCT)

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Capturing a Competitive Advantage with a Secure Payments Infrastructure by Intel

May 2011 - (Free Research)
A number of factors are driving financial institutions to re-evaluate their payment methods.  These factors include regulations such as Single Euro Payments Area in Europe, which calls for new payment vehicles for customers. Find out how one financial institution was able to meet compliance demands by utilizing a secure payments infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Cisco Small Business 100 Series Secure Broadband Routers by Cisco Systems, Inc.

The Cisco® Small Business Series of secure broadband routers addresses the needs of small businesses, providing affordable, easy-to-use, and secure broadband access for data-only applications. 
(HARDWARE PRODUCT)

Securing Data Stored on Tape with Encryption: How to Choose the Right Encryption Key Management Solution by Quantum Corporation

October 2008 - (Free Research)
Q-EKM software, is designed to generate and communicate encryption keys and it is a proven, easy-to-use, library-managed encryption solution designed to protect sensitive data throughout the enterprise. 
(WHITE PAPER) READ ABSTRACT |

Secure with Confidence: Secure Your Enterprise with zEnterprise by IBM

July 2013 - (Free Research)
Check out this exclusive white paper to find out about IBM zEnterprise System and the results of a study of customers spending patterns who have deployed it. 
(WHITE PAPER) READ ABSTRACT |

TMOS - Secure Development and Implementation for Application Delivery Networks by F5 Networks

September 2008 - (Free Research)
In this white paper, read how TMOS--the foundation and architecture for F5's application delivery controllers running on the BIG-IP platform--brings a wealth of security to existing application delivery networks. 
(WHITE PAPER) READ ABSTRACT |

Three Improvements You Can Make Right Now to Enhance Your Customer's Experience. by Cisco Systems, Inc.

October 2008 - (Free Research)
This document explains the three steps you can take to help ensure a positive Web experience for your customers. 
(WHITE PAPER) READ ABSTRACT |

The Ten Best Practices for Secure Software Development by ISC2

December 2010 - (Free Research)
Read this white paper to learn the top ten best practices to help fulfill the SSLP’s mission of building hack-resilient software. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication by SafeNet, Inc.

September 2009 - (Free Research)
Many financial organizations are looking to implement proactive security measures to combat identity theft. Strong authentication – a security method which employs the use of more than one factor to identify users accessing private networks and applications – is among today’s leading choices. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Secure File Transfer: Send it Fast, but Send it Safely by SearchSecurity.com

April 2014 - (Free Research)
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity. 
(EBOOK) READ ABSTRACT |

Top 3 Tips to Securing Your Portal - And Protecting Your Customer by RSA, The Security Division of EMC

February 2008 - (Free Research)
Enterprises are striving to accelerate their businesses by sharing core business data across all channels. Learn how you can strengthen your organization's portal(s), improve customer security and inspire customer confidence. 
(WHITE PAPER) READ ABSTRACT |

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit by Attachmate Corporation

March 2012 - (Free Research)
This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Tackling SSL Vulnerabilities for Secure Online Transactions by SearchSecurity.com

October 2013 - (Free Research)
As internet commerce continues to grow in leaps and bounds, so too does the type and sophistication of cyber-attacks. This expert E-Guide takes a detailed look at recent security breaches and examines the steps that businesses must take to protect themselves and their customers. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 457 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts