Security On-LineWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security On-Line returned the following results.
RSS What is RSS?
Related Categories

 •   On-line Customer Support
 •   Customer Service (General)
 •   Customer Relationship Management (CRM)
 •   Customer Experience Management (CEM)
 •   Social Networks and Community Management
 •   Call Center Management
 •   Customer Information Management/ Customer Databases
 •   Customer Interaction Management
 •   Network Security
 •   Help Desk and Call Management

Related Searches
 •   Capacity Security On-Line
 •   Case Security On-Line
 •   Developments Security On-Line
 •   Files Security
 •   Measurement Of Security On-Line
 •   Security On-Line Email
 •   Security On-Line Finds
 •   Security On-Line Iowa
 •   Security On-Line Video
 •   Template Security On-Line
Advertisement

ALL RESULTS
1 - 25 of 495 | Next Page

Featured Sponsors

Advanced Meter Infrastructure: Composite Technologies to Meet New Demands in Sales and Customer Service by SAP America, Inc..
Discover what benefits advanced meter infrastructure (AMI) brings and why, and learn how the SAP NetWeaver platform and enterprise service-oriented architecture can support more...
>> Discover more offerings from SAP America, Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Ensuring Security on i by Bsafe Information Systems

August 2008 - (Free Research)
This security runbook guides you through all stages of securing your system. Discover the importance of a company-wide commitment to security. 
(WHITE PAPER) READ ABSTRACT |

Economic & Productivity Impact of IT Security on Healthcare - Video by Imprivata

May 2013 - (Free Research)
View this webcast to explore the results of a recent Ponemon Institute study that indicate a clear need for healthcare institutions to invest in modern communications technology to ensure efficient patient care, as well as compliance with the Health Insurance Portability and Accountability Act (HIPAA) regulations. 
(WEBCAST) READ ABSTRACT |

Managing Security on Mobile Phones by Nokia

January 2008 - (Free Research)
This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges. 
(ANALYST REPORT) READ ABSTRACT |

The Economic and Productivity Impact of IT Security on Healthcare by Imprivata

May 2013 - (Free Research)
This Ponemon case study highlights the economic and productivity impact of outdates communications technology in healthcare facilities. Read the results to understand the steps needed to balance the benefits of technology with HIPAA regulations. 
(WHITE PAPER) READ ABSTRACT |

Challenges With Data Protection in the Cloud by Varonis

June 2013 - (Free Research)
This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property. 
(ANALYST BRIEF) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

Managing desktops in modern IT environments by TechTarget

February 2014 - (Free Research)
As a result of growing mobility trends and emerging technologies, desktop management has become increasingly complex. Fortunately, you don't have to battle it alone. Complete this short survey and gain access to a comprehensive desktop management guide to help you minimize common challenges. 
(RESOURCE)

NETGEAR Prosecure Security Threat Management by NETGEAR Inc.

October 2010 - (Free Research)
An end-point solution for each threat was not a cost-effective solution, and paying for security on a per-user license basis was clearly out of the question. What’s more, a number of appliances only protected either web or email, but not both at the same time. Read this case study to learn more about an effective solution to these problems. 
(CASE STUDY) READ ABSTRACT |

Avoiding 7 Common Mistakes of IT Security Compliance by Qualys, Inc.

April 2009 - (Free Research)
This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals. 
(EGUIDE) READ ABSTRACT |

Technical Comparison of On-line Vs. Line-interactive UPS Designs by APC by Schneider Electric

January 2004 - (Free Research)
This paper describes the advantages and disadvantages of each topology and addresses some common misconceptions about real-world application requirements. 
(WHITE PAPER) READ ABSTRACT |

Real Innovations with Real Budget by IBM

March 2010 - (Free Research)
Watch this video to learn how IBM Rational can help you achieve your business objectives within your budget. Topics covered include 1)Increasing Security on the Web, 2)Optimizing Software Quality Process, and 3)Improving Collaboration. 
(VIDEO) READ ABSTRACT |

How to Address Your Top Tech Problems by AT&T Corp

August 2010 - (Free Research)
For companies without full-time IT staff, affordable tech support is especially important. Subscription services like AT&T Tech Support 360SM can be a great solution for wireless network configuration, e-mail, office application and computer performance problems, mobile device setup, virus removal and other troublesome support issues. 
(WHITE PAPER)

Cisco Catalyst 2950 Series Switches with Enhanced Image SW by Cisco Systems, Inc.

The Cisco Catalyst 2950 Series switches offer enhanced data security through a wide range of security features. 
(HARDWARE PRODUCT)

IT Connects Customers to Brands by Cisco Systems, Inc.

August 2010 - (Free Research)
Paul Gillin, author of three social media marketing books, reveals how CIOs are becoming the designated guardians of intellectual property. As the use of social media tools grows, Gillen recommends how a CIO can stay in front of the widespread access and create enhanced customer experiences. 
(VIDEO)

DataShare by Excel Meridian Data, Inc.

DataShare is a dual-function server that performs both CD/DVD File Sharing tasks as well as NAS File Data Archiving. It is the first CD/DVD server available in the market that combines these unique features in one easy-to-use solution. 
(HARDWARE PRODUCT)

ERP Software Acquisition in an FDA Regulated Environment by SoftBrands, Inc.

March 2008 - (Free Research)
This white paper presents a guideline to help you select an ERP system for your FDA validation. Explore a five phase software acquisition life cycle model to help you accomplish these objectives as efficiently as possible. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Other Green - Storage Efficiency and Optimization by Symantec Corporation

September 2009 - (Free Research)
This session will look at various techniques and strategies to optimize either on-line active or primary as well as near-line or secondary storage environment during tough economic times, as well as to position for future growth, after all, there is no such thing as a data recession! 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Business Analytics Buying Criteria: The Three Maxims by IBM

August 2012 - (Free Research)
When evaluating business analytics systems, IT leaders must consider the performance and scalability requirements of the underlying infrastructure. This paper examines the types of business analytics software available, highlights the analytical workload demands, and buying criteria to consider for various types of business analytics software. 
(WHITE PAPER) READ ABSTRACT |

Oracle to Teradata Migration Case Studies: Realizing value and improving capabilities by Teradata

April 2011 - (Free Research)
This paper profiles four of the more than 200 Oracle customers who have migrated to a Teradata solution. The companies profiled in this paper have achieved performance improvements, additional business benefits that justify the migration cost, and successful integration of the Teradata Database with the Oracle OLTP environment. 
(CASE STUDY) READ ABSTRACT |

The Customer Service Balancing Act by Jive Software

July 2013 - (Free Research)
Access this helpful resource to discover a customer service technology that provides complete integration of all your customer communication channels so that you can achieve a unified view of customer interactions. Read on to discover how this peer-based strategy can cut costs while enhancing customer service by reading now! 
(WHITE PAPER) READ ABSTRACT |

Turning Social Media into a Game-Changing Customer Care Channel by Aspect

May 2013 - (Free Research)
Today's customers demand highly personalized, engaging experiences, and leveraging social media to transform your contact center is a way to surpass these expectations. Access this whitepaper to learn how combining contact center best practices with social media CRM technologies can increase the effectiveness of your customer interactions. 
(WHITE PAPER) READ ABSTRACT |

Using Social Media to Win Over Customers by SearchCRM

March 2013 - (Free Research)
While many businesses are eager to join their customers at the social media party, doing so without the proper internal processes in place could spell disaster. In this brief expert e-book, you can learn how to create a successful social CRM initiative (and valuable customer relations) through implementing the right processes and technologies. 
(EBOOK) READ ABSTRACT |

About T-Mobile USA by Jive Software

June 2013 - (Free Research)
Find out in this case study how a social business platform enabled T-mobile to consolidate and centralize information about products, services, pricing, policies and troubleshooting, enabling sales reps to better utilize their time. 
(CASE STUDY) READ ABSTRACT |

5 Ways to Optimize Your Workforce by Aspect

December 2012 - (Free Research)
You need to provide a flexible, efficient and consistent customer experience, but with the myriad of communication channels available today, legacy service strategies are inadequate. Read on to learn how unified communications and workforce optimization can provide the visibility and control needed to deliver exceptional customer service. 
(WHITE PAPER) READ ABSTRACT |

Customer Experience: Empowering People. Powering Brands. by Oracle Corporation UK Ltd

December 2012 - (Free Research)
The way you do business has changed. Today's customers can make decisions about the products or services you offer without ever contacting your company directly, making an exceptional experience across all customer touch points paramount. Read on to learn about innovative technologies can help you enhance the customer experience. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 495 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts