Research Security Agent New HampshireWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Research Security Agent New Hampshire returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Contact Center Management
 •   Storage Management
 •   Call Center Management
 •   Customer Relationship Management (CRM)
 •   Customer Service (General)
 •   Customer Experience Management (CEM)
 •   Data Security
 •   Disk-based Backup & Storage/ RAID
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Info Research Security Agent
 •   Knowledge Research Security
 •   Research Request
 •   Research Security Agent Based
 •   Research Security Agent Improve
 •   Research Security Agent Policy
 •   Research Security Agent Scripts
 •   Research Security Samples
 •   Scripts Research
 •   Storage Research
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..

Basingstoke and North Hampshire NHS Foundation Trust unites the ‘clinical five’ by IBM

August 05, 2011 - (Free Research)
Check out this case study to learn how leading health care provider Basingstoke and North Hampshire NHS Foundation Trust was able to integrate and consolidate data between locations for significant cost savings, as well as increases in efficiency and productivity. 
(CASE STUDY) READ ABSTRACT |

Lumension Endpoint Management and Security Suite by Lumension

September 13, 2010 - (Free Research)
A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority. 
(TRIAL SOFTWARE)

UNH Data Protection Makes the Grade with SEPATON S2100-ES2 Virtual Tape Library by SEPATON

August 21, 2009 - (Free Research)
As part of a data center consolidation project, the University of New Hampshire wanted to implement a faster, more efficient way to backup and protect their academic and administrative data. They turned to the SEPATON S2100-ES2 virtual tape library (VTL) with DeltaStor data deduplication. 
(CASE STUDY) READ ABSTRACT |

Advanced Technologies Key to Next-Gen Contact Centers by LogMeIn, Inc.

March 27, 2014 - (Free Research)
Access this helpful e-guide to learn how to improve customer experience by equipping contact center agents with the right tools and technologies. Discover why Forrester Research analyst Art Schoeller recommends an "outside-in approach" to acquiring new contact center technologies, and explore his key considerations for adopting new tools 
(EGUIDE) READ ABSTRACT |

Debunking Security Concerns with Hosted Call Centers by inContact

January 10, 2011 - (Free Research)
This paper discusses the different layers requiring security, how security should be addressed in each layer, and how to select a qualified hosted call center provider. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Faster, Cheaper, Safer: Improving Agility, TCO, and Security with Agentless Job Scheduling by BMC Software, Inc.

April 17, 2009 - (Free Research)
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. This EMA whitepaper will review the implementation and benefits of agentless job scheduling. 
(WHITE PAPER) READ ABSTRACT |

Designing Artificial Intelligence for Games (part 2) by Intel Software Network

June 11, 2009 - (Free Research)
This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI. 
(WHITE PAPER)

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 13, 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

The Truth about Agent Vs. Agentless Monitorinng: A Short Guide to Choosing the Right Solution by uptime software inc.

July 1967 - (Free Research)
When selecting an enterprise-level monitoring solution, one of the first decisions the IT department needs to make is whether to opt for an agent based, or agentless monitoring solution. This paper helps you arrive at a decision. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Home Agents by Avaya Inc.

June 2008 - (Free Research)
Employing home agents allows you to expand and improve your call center team. And they can be a form of insurance to keep your business running if disaster strikes. This white paper contains best practices for developing a Home Agents program. 
(WHITE PAPER) READ ABSTRACT |

Change Management for BPM by OpenText

December 2012 - (Free Research)
In this expert e-guide, Forrester Research's Connie Moore offers advice on how businesses can incorporate change management programs into their business process management (BPM) initiatives. 
(EGUIDE) READ ABSTRACT |

Simplifying Disaster Recovery for Complex Virtual Environments by Acronis

January 2011 - (Free Research)
Many organizations struggle to deal with the management challenges of complex IT environments, not only on backup performance and the achievement of Recovery Time Objectives in disaster recovery, but also on productivity, performance and profitability. 
(EBOOK) READ ABSTRACT |

Effective Storage Management for Virtual Servers by IBM

December 2011 - (Free Research)
View this video to learn how IBM provides advanced data protection and flexible recovery capabilities for VMware, effectively addressing the many unique data management challenges that exist in virtual server environments. 
(VIDEO) READ ABSTRACT |

Leveraging Agent and Agentless Technology for Effective Operations Management by Hewlett-Packard Company

February 2008 - (Free Research)
In this white paper learn the benefits of using agent-based and agentless technologies to monitor infrastructure performance and availability. Also read about the total cost of ownership for both agent-based solutions as well as agentless techn... 
(WHITE PAPER) READ ABSTRACT |

Executive Insight: Multi-Sourcing in the Call Center by inContact

February 2009 - (Free Research)
This paper examines how many executives are beginning to understand that cutting cost by outsourcing call center operations isn't always the best solution. Learn how "cheaper" often comes at the expense of "better". 
(WHITE PAPER) READ ABSTRACT |

3-2-1 Contact: The Call Center in a Multichannel World by SearchCRM

April 2014 - (Free Research)
Learn how mobile apps are changing how agents interact with customers -- and how some companies are integrating mobile CRM with the contact center. 
(EBOOK) READ ABSTRACT |

Making WFM Work: Best Practices and ROI Model by Calabrio, Inc.

January 2012 - (Free Research)
There has been tremendous innovation in contact center workforce management (WFM) over the past three years, with new vendors and offerings entering the scene. Find out how the new generation of WFM solutions are easier to use, improve agent satisfaction, enhance customer experience and cut costs. 
(WHITE PAPER) READ ABSTRACT |

Making WFM Work: Best Practices and ROI Model by Calabrio, Inc.

June 2011 - (Free Research)
There has been tremendous innovation in contact center WFM over the past three years, with new vendors and offerings entering the scene. Find out how the new generation of WFM solutions are easier to use, improve agent satisfaction, enhance customer experience and cut costs. 
(WHITE PAPER) READ ABSTRACT |

Agentless Architecture. Agentless Backup is Not A Myth by Asigra

August 2010 - (Free Research)
Backup and recovery software typically requires agents that are installed onto the host servers that a system administrator wants to back up. The Asigra solution requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. Read this whitepaper to learn more! 
(WHITE PAPER) READ ABSTRACT |

Top 10 Tips on Getting Started with Speech Analytics by Verint Systems

April 2008 - (Free Research)
By enabling enterprises to mine large volumes of recorded customer/agent voice interactions, speech analytics is redefining quality in a way that can promote greater customer satisfaction, loyalty, and value. 
(WHITE PAPER) READ ABSTRACT |

Protecting Against the New Wave of Malware: Osterman Research by Sunbelt Software

September 2008 - (Free Research)
This paper addresses the variety of issues organizations face in context of their security challenges, and discusses the capabilities of VIPRE Enterprise, an integrated platform that provides high-performance, integrated endpoint protection capabilities. 
(WHITE PAPER) READ ABSTRACT |

Contact Center Costs: The Case for Telecommuting Agents by Avaya Inc.

April 2008 - (Free Research)
This white paper addresses high labor costs that are inevitable with contact centers and how a telecommuting or home agent program can greatly reduce your labor cost while increasing productivity of your contact center. 
(WHITE PAPER) READ ABSTRACT |

What's New With Microsoft Office Communications Server 2007 R2 by Microsoft

March 2009 - (Free Research)
This presentation transcript explains the new features and functionality in the Office Communications Server 2007 R2, the application that continues to deliver on the Microsoft promise to streamline communications for users, give IT organizations the flexibility and control they need, and provide an extensible communications platform. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension

August 2009 - (Free Research)
Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity. 
(WEBCAST) READ ABSTRACT |

The New CRM Metrics: Putting Them to Work by SearchCRM

January 2013 - (Free Research)
There is added pressure for contact center agents, with customers armed to the teeth with devices to connect with businesses- from tweets to texts to telephone calls. But with proper metrics to gauge their performance and lead to instructive training, some of that pressure can be alleviated. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts