Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

point service

Results 201 - 215 of 215Sort Results By: Published Date | Title | Company Name
Published By: Avaya     Published Date: Nov 27, 2017
In an industry like automobile sales and service, responsiveness can easily mean the difference between a service appointment, a large-ticket sale – or a customer taking their business elsewhere. Despite its reputation for meeting and exceeding customer needs, Voss Auto Network was using an aging communications system. The network of dealerships, including eight locations across Ohio, serves over 500 employees. Getting calls even when “walking the lot,” quickly retrieving voicemails, and having the ability to easily track missed calls all proved key to taking customer service, sales, and repeat business to the next level.
Tags : 
    
Avaya
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale
    
VeriSign Incorp.
Published By: Oracle + Dyn     Published Date: Aug 31, 2017
"Hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of multiple endpoints to deliver applications, sites and services, requiring a performance management strategy to ensure those services reach users effectively. This educational webinar will cover the importance of: • Optimizing round trip times and latency, with clear real-time data • Understanding the importance of load balancing and active failover • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success! Watch now! "
Tags : 
    
Oracle + Dyn
Published By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : 
stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla)
    
Stratus Technologies
Published By: Lexmark     Published Date: May 28, 2014
A UBM Techweb white paper on how point-of-service employees are vital for nurturing existing customers and bringing in new ones.
Tags : 
pos, lexmark, mps, point-of-service
    
Lexmark
Published By: Lexmark     Published Date: May 28, 2014
A UBM Techweb white paper on how point-of-service employees are vital for nurturing existing customers and bringing in new ones.
Tags : 
pos, lexmark, mps, point-of-service
    
Lexmark
Published By: Lexmark     Published Date: Jun 02, 2014
A UBM Techweb white paper on how point-of-service employees are vital for nurturing existing customers and bringing in new ones.
Tags : 
pos, lexmark, mps, point-of-service
    
Lexmark
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification
    
Trapeze Networks
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
    
Fortinet EMEA
Published By: Lenovo     Published Date: Aug 31, 2018
? Smarter and more efficient workplaces are becoming a norm as these spaces enhance productivity, collaboration, and efficiency. Lenovo offers the best-in-class solutions to make the organizational workplace efficiency a reality. Starting from endpoint devices which enable workspace optimization to IT automation services, we bridge the gap between user requirements and IT deployments.
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Sep 10, 2018
Smarter and more efficient workplaces are becoming a norm as these spaces enhance productivity, collaboration, and efficiency. Lenovo offers the best-in-class solutions to make the organizational workplace efficiency a reality. Starting from endpoint devices which enable workspace optimization to IT automation services, we bridge the gap between user requirements and IT deployments.
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Sep 27, 2018
Smarter and more efficient workplaces are becoming a norm as these spaces enhance productivity, collaboration, and efficiency. Lenovo offers the best-in-class solutions to make the organizational workplace efficiency a reality. Starting from endpoint devices which enable workspace optimization to IT automation services, we bridge the gap between user requirements and IT deployments.
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Sep 11, 2018
Smarter and more efficient workplaces are becoming a norm as these spaces enhance productivity, collaboration, and efficiency. Lenovo offers the best-in-class solutions to make the organizational workplace efficiency a reality. Starting from endpoint devices which enable workspace optimization to IT automation services, we bridge the gap between user requirements and IT deployments.
Tags : 
    
Lenovo
Published By: Lenovo     Published Date: Sep 12, 2018
Smarter and more efficient workplaces are becoming a norm as these spaces enhance productivity, collaboration, and efficiency. Lenovo offers the best-in-class solutions to make the organizational workplace efficiency a reality. Starting from endpoint devices which enable workspace optimization to IT automation services, we bridge the gap between user requirements and IT deployments.
Tags : 
    
Lenovo
Published By: Cisco Umbrella EMEA     Published Date: Aug 09, 2019
You are doing everything you can to avoid breaches. But what happens when a hacker manages to bypass your security? In this webinar we will show you how to build a strong security posture and a layered defence that will give you the ability to quickly respond to breaches. We will cover: - The evolving threat landscape and why prevention-only strategies eventually fail - How to build a strong first line of defence to reduce exposure to threats - Protect your last line of defence with retrospective security - A quick demo of how Cisco Umbrella and AMP for Endpoints work together to contain, detect and remediate threats in real time - An overview of how Incident Response Services can help you with the skills you need to manage a breach
Tags : 
    
Cisco Umbrella EMEA
Start   Previous    1 2 3 4 5 6 7 8 9     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.