Security B2CWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security B2C returned the following results.
RSS What is RSS?
Related Categories

 •   Customer Relationship Management (CRM)
 •   Customer Experience Management (CEM)
 •   Social Networks and Community Management
 •   Mobile Device Management
 •   Customer Service (General)
 •   Laptops/ Notebooks/ Tablet PCs
 •   Business Planning
 •   Business to Consumer Web Commerce
 •   Business to Business Web Commerce
 •   Application Lifecycle Management(ALM)

Related Searches
 •   Benefit Security B2C
 •   Organizational Security B2C
 •   Security B2C California
 •   Security B2C Chart
 •   Security B2C Email
 •   Security B2C Need
 •   Security B2C Oklahoma
 •   Security B2C Price
 •   Security B2C View
 •   Security Electronic
Advertisement

ALL RESULTS
1 - 25 of 500 | Next Page

Featured Sponsors

Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..

Consumer Web Portals: Platforms at Significant Security Risk by EMC Corporation

December 31, 2013 - (Free Research)
This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience. 
(WHITE PAPER) READ ABSTRACT |

Consumer Web Portals: Platforms At Significant Security Risk by RSA, The Security Division of EMC

December 31, 2013 - (Free Research)
These survey results show just how badly affected some organizations were due to weak authentication, authorization, and fraud detection strategies. Click through to learn why a strong security posture is a must. 
(WHITE PAPER) READ ABSTRACT |

Analyst Research IBM Synchronizes its Commerce 2.0 Strategy with ‘Smarter Commerce’ Initiative by IBM

March 31, 2011 - (Free Research)
In this paper, IDC Insight highlights the important elements of the IBM Smarter Commerce announcement and looks at the implications of the announcement in the context of a powerful movement that is occurring in the commerce solutions marketplace, both business to business (B2B) and business to consumer (B2C). 
(ANALYST BRIEF) READ ABSTRACT |

Geoffrey Moore on Application Transformation –Part 2 by Hewlett-Packard Company

July 05, 2012 - (Free Research)
Watch this video featuring renowned author and venture capitalist Geoffrey Moore as he discusses the future of enterprise IT and specifically how your application strategy can take full advantage of the latest tools and technology from mobile, the cloud, social media and more. 
(WEBCAST) READ ABSTRACT |

Put your business in motion. Become a mobile enterprise. by IBM

April 30, 2013 - (Free Research)
Forward-thinking companies realize that in order to improve customer experience and business performance, they need to make their services, products, and strategies available to the mobile consumer at all times. In this helpful resource, learn how to overcome some of the most common challenges surrounding mobile engagement. 
(WHITE PAPER) READ ABSTRACT |

The Future of Innovation Management: The Next 10 Years by ComputerWeekly.com

September 05, 2011 - (Free Research)
Download this report from Arthur D Little to learn 5 key innovation concepts for CIOs and CTOs. 
(IT BRIEFING) READ ABSTRACT |

Service. Smarter. Redefining commerce in the age of the customer by IBM

May 01, 2012 - (Free Research)
Access this white paper to discover how a better, smarter approach to commerce can eliminate the potential for unhappy customers and improve your reputation and brand. In today’s highly competitive marketplace, ensuring your customers are satisfied with your services is worth the extra effort. 
(WHITE PAPER) READ ABSTRACT |

Gartner: What CIOs should know about cloud‑based customer service by ComputerWeekly.com

November 25, 2013 - (Free Research)
IT leaders and managers of customer support need to understand the limits of cloud-based CRM customer service and support software solutions, writes Michael Maoz, vice-president and distinguished analyst at Gartner. 
(ANALYST BRIEF) READ ABSTRACT |

Over-the-Top Video: First to Scale Wins by ComputerWeekly.com

October 12, 2012 - (Free Research)
This report from Arthur D Little assess the impact of video services focusing on professional long-form content, such as Hulu, Lovefilm and Netflix. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Smart phone, smarter service. by ComputerWeekly.com

August 24, 2012 - (Free Research)
Quocirca analysts, Rob Bamforth and Clive Longbottom, offer advice to businesses on exploiting smart phones as a channel to reach customers and clients. 
(ANALYST REPORT) READ ABSTRACT |

Gartner: CIO checklist for next-generation mobile strategies by ComputerWeekly.com

July 31, 2012 - (Free Research)
This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology. 
(ANALYST BRIEF) READ ABSTRACT |

Euro crisis: Key questions CEOs and CIOs should ask each other by ComputerWeekly.com

April 02, 2012 - (Free Research)
With a potential economic crisis looming in the Eurozone, Gartner offers a checklist of questions that CIOs and CEOs should ask each other. 
(ANALYST BRIEF) READ ABSTRACT |

CW Buyer's Guide: Customer Relations (CRM) by ComputerWeekly.com

October 05, 2011 - (Free Research)
This nine-page Buyer's Guide to Customer Relationsip Management (CRM) analyses the factors CIOs and senior IT professionals will need to consider as they plan their CRM strategies. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Rethink Defense-In-Depth Security Model For BYOD by SearchSecurity.com

July 03, 2013 - (Free Research)
This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised. 
(EGUIDE) READ ABSTRACT |

IT Security Trends 2013: Mobile security concerns tops the list by SearchSecurity.com

November 26, 2013 - (Free Research)
This expert resource takes an in-depth look at the security trends and priorities of 2013, discussing the shift away from old-school defenses and the central role that mobile security has taken in today's strategies. 
(WHITE PAPER) READ ABSTRACT |

Building momentum: Symantec's new approach to security by TechTarget

March 18, 2014 - (Free Research)
Despite its undisputed dominance of the security market, Symantec's revenues have remained static in recent years. Arif Mohamed reports in this eGuide, whether the expansion of its enterprise data security, cloud and mobile portfolio will return it to growth. 
(RESOURCE)

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 30, 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

HOW TO USE PCI SSC SUPPLEMENT TO ACHIEVE PCI COMPLIANCE IN THE CLOUD by SearchSecurity.com

September 19, 2013 - (Free Research)
This expert guide from SearchSecurity.com examines highlights of the PCI SSC's guidelines to help your business achieve PCI compliance in the cloud. Read on to learn how you can easily secure your applications and your customers' trust. 
(EGUIDE) READ ABSTRACT |

Security Leadership Series: Security Strategies for Success by Citrix

May 01, 2014 - (Free Research)
This white paper offers best practices for 3 key initiatives that can improve security given the increase in mobility and cloud trends. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization by Citrix

June 18, 2013 - (Free Research)
Read this white paper to learn more about how deploying desktop virtualization can ensure your information is secure, allowing you to embrace workshifting and emerging technology. 
(WHITE PAPER) READ ABSTRACT |

The 10 “must-haves” for secure enterprise mobility by Citrix

February 28, 2013 - (Free Research)
This whitepaper provides a security framework and evaluator's checklist you can use to make sure you are securing mobile devices and data properly, including the 10 "must haves" for secure enterprise mobility. 
(WHITE PAPER) READ ABSTRACT |

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones by Citrix

August 07, 2012 - (Free Research)
A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption. 
(WHITE PAPER) READ ABSTRACT |

Security Primer: Top Tips for Protecting Your System i by Bytware, Inc.

March 06, 2008 - (Free Research)
This E-Guide from TechTarget's Search400.com explores the many components of System i security. 
(WHITE PAPER) READ ABSTRACT |

An Objective Approach to Security by Bytware, Inc.

May 01, 2007 - (Free Research)
i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this... 
(WHITE PAPER) READ ABSTRACT |

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model by FireEye

June 05, 2014 - (Free Research)
This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 500 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts