Online ServicesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Online Services returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Security
 •   Storage Management
 •   Authentication / Password Management
 •   Application Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Fraud Detection & Prevention
 •   Application Management and Maintenance
 •   Enterprise Data Protection and Privacy
 •   Identity Management/ User Provisioning

Related Searches
 •   Codes Online
 •   Decision Online Services
 •   Online Conferences
 •   Online Managing
 •   Online Services Administration
 •   Online Services Conversions
 •   Online Services Market
 •   Online Services Programs
 •   Presentation Online Services
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

The Future of Authentication for Online Services by SafeNet, Inc.

November 02, 2009 - (Free Research)
In this white paper, we take a look at how strong authentication can benefit eCommerce and online services. We will evaluate the risks that identity fraud, phishing and cybercrime pose for online service providers and discuss how strong user authentication can alleviate these risks. 
(WHITE PAPER) READ ABSTRACT |

The Business Value of Online Services by Microsoft

August 23, 2010 - (Free Research)
Join us for this webcast to learn how organizations of all sizes, from multi-nationals to small businesses, are choosing Microsoft Online Services to drive their business productivity and control costs. 
(VIDEO) READ ABSTRACT |

Business Productivity with Microsoft Online Services by Microsoft

September 15, 2009 - (Free Research)
This data sheets examines how Microsoft Online Services can give your business the powerful productivity capabilities of Microsoft Exchange Server, Microsoft Office SharePoint Server, Microsoft Office Communications Server, and Microsoft Office Live Meeting —all hosted online. 
(DATA SHEET) READ ABSTRACT |

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication by SafeNet, Inc.

September 01, 2009 - (Free Research)
Many financial organizations are looking to implement proactive security measures to combat identity theft. Strong authentication – a security method which employs the use of more than one factor to identify users accessing private networks and applications – is among today’s leading choices. 
(WHITE PAPER) READ ABSTRACT |

Driving Customer Service Success in the Cloud with Microsoft Dynamics CRM Online by Microsoft

August 23, 2010 - (Free Research)
Join us for this webcast to learn how Microsoft Dynamics CRM Online provides complete service management functionality to help you manage cases, contracts, and knowledge. 
(VIDEO) READ ABSTRACT |

Global Organizations Choose Microsoft Cloud Applications by Microsoft

November 02, 2009 - (Free Research)
In this press release, Microsoft announces the availability of the Business Productivity Online Suite to more countries and regions, with added new features, and lower prices. Continue reading to learn about Business Productivity Online Suite and read testimonials from different customers. 
(PRESS RELEASE)

SRI Ecuador Implements Red Hat Solutions: A Scalable , Reliable Platform to Provide Online Services to Taxpayers by Red Hat and HP

April 10, 2013 - (Free Research)
Access this informative case study to learn how Ecuador's tax management agency utilized a Linux solution to enable and promote internet-based tax return filing, reducing processing times and avoiding increased infrastructure complexity. 
(WHITE PAPER) READ ABSTRACT |

Acoustics Management and Noise Mitigation in the OSP Environment by Emerson Network Power

August 15, 2007 - (Free Research)
This white paper details the noise problems that come with an expanding client base and how to stay quiet and meet regulations. 
(WHITE PAPER) READ ABSTRACT |

Taking the fear out of bringing Government Systems online by IBM

July 24, 2012 - (Free Research)
People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems. 
(WHITE PAPER) READ ABSTRACT |

The identity perimeter by ComputerWeekly.com

April 05, 2013 - (Free Research)
Analysts Bob Tarzey and Rob Bamforth, make the case for identity management and advanced single-sign-on (SSO) to help businesses and their customers and partners work in a more integrated way. 
(ANALYST REPORT) READ ABSTRACT |

Security Whitepaper: Google Apps Messaging and Collaboration Products by Google

July 06, 2010 - (Free Research)
Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Security Whitepaper: Google Apps Messaging and Collaboration Products by Google Apps

January 19, 2011 - (Free Research)
Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Security Whitepaper: Google Apps Messaging and Collaboration Products by Google Apps

January 19, 2011 - (Free Research)
Google Apps provide familiar, easy to use products and services for business settings. These services enable customers to access their data virtually anytime and anywhere from Internet-capable devices. This computing environment is called "the cloud." Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Business in the Cloud: Will Your Internet Connectivity Provide a Positive ROI? by Internap Network Services

April 06, 2010 - (Free Research)
Using a simple Return on Investment (ROI) approach, enterprises can quantify the value of best-in-class connectivity. What are the tangible financial drawbacks when you experience outages or latency? How do you measure your risk and then mitigate it? This paper addresses all the factors associated with being able to calculate your own ROI. 
(WHITE PAPER) READ ABSTRACT |

Growing Market Share in a Highly Competitive Financial Services Industry by Keynote Systems

January 01, 2004 - (Free Research)
Financial services organizations strive to retain existing customers and attract new ones, many are introducing new, enhanced services over the Web. Ensure you are providing the best possible experience by focusing your SLM processes on the end user. 
(WHITE PAPER) READ ABSTRACT |

VeriSign® Identity Protection Fraud Detection Service by VeriSign EMEA

November 2008 - (Free Research)
This white paper explores how the VeriSign® Identity Protection (VIP) Fraud Detection Service helps organizations mitigate issues related to identity theft and insider threats. 
(WHITE PAPER) READ ABSTRACT |

Mastering Exchange Migrations: Controlling the Top Ten Critical Issues (webcast) by Dell Software

October 2013 - (Free Research)
This webcast offers tips for planning, deploying and managing a new Exchange platform that links email, voice and fax communications into one unified infrastructure, creating a seamless user interface, integrated online services and controlled compliance. 
(WEBCAST) READ ABSTRACT |

E-Guide: How to build a toolset to avoid Web 2.0 security issues by SearchSecurity.com

September 2010 - (Free Research)
Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network. 
(EGUIDE) READ ABSTRACT |

Information Security ANZ March 2014 by SearchSecurity.com

March 2014 - (Free Research)
This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region. 
(EZINE) READ ABSTRACT |

Workday Security: A Technology Perspective by Workday

October 2008 - (Free Research)
Workday uses industry-standard measures to protect the integrity of all communications with its online services, its production network, and across its network. 
(WHITE PAPER) READ ABSTRACT |

Finally, a Simple Way to Deploy a Customer Contact Center by Contactual (Now 8x8, Inc.)

February 2010 - (Free Research)
The goal of customer interaction is to provide consistent and efficient service across all areas of customer contact channels. In this paper we examine two alternatives: building a contact center in-house versus using an online service such as Contactual OnDemand Contact Center to interact efficiently with customers. 
(WHITE PAPER) READ ABSTRACT |

ISCSI SAN Boot - Simplifying Server Operations On SANS by Dell, Inc.

March 2009 - (Free Research)
Storage area networks (SAN) deliver consolidated storage and advanced storage management features. This paper explains the benefits of three different server boot operations provided by one advanced SAN configuration. It counsels that you should weigh the benefits and drawbacks of each before committing your organization's storage system to one. 
(WHITE PAPER) READ ABSTRACT |

Rabobank International Enabling Customers to Bank Safe With HP by Hewlett-Packard Limited

November 2013 - (Free Research)
View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime. 
(WEBCAST) READ ABSTRACT |

Deutsche Post DHL Case Study Enterprise Agility through DevOps by CollabNet

December 2011 - (Free Research)
Read this brief case study to discover how global company Deutsche Post DHL leveraged an agile application lifecycle management (ALM) platform to implement better IT governance, streamline collaboration and sharing software modules, automate and standardize application delivery, and gain visibility into source code and software partner information. 
(CASE STUDY) READ ABSTRACT |

22 November 2011: Read the latest issue of the UK’s leading technology publication, where we analyse the latest technology news and what it means for IT managers. by ComputerWeekly.com

December 2011 - (Free Research)
In this week’s Computer Weekly, we talk to the British Library about the enormous storage challenges of digitising its printed archive; we examine the state of the UK IT jobs market and the skills that are most in demand by employers; and we look at case studies of the best virtualisation projects. Download the new issue now. 
(EZINE) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts