Cisco VG350 Instrukcja Użytkownika Strona 26

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 41
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 25
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
28
Harassing / Threatening
Callers
Harassing / Threatening
Callers
Voice Service Abuse &
Theft
Voice Service Abuse &
Theft
Capacity MonitoringCapacity Monitoring
Toll FraudToll Fraud
Contact Center Fraud
& ID Theft
Contact Center Fraud
& ID Theft
Unauthorized Fax or
Modem Usage
Unauthorized Fax or
Modem Usage
Avoid productivity loss & safety
issues
Ensure employee voice network
use matches business objectives
Enables better network planning
and staffing requirements
Corporations lack real-time
defense
Legal risk and financial losses for
corporations and customers
Most commonly found issue
Przeglądanie stron 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 40 41

Komentarze do niniejszej Instrukcji

Brak uwag