OVERVIEW OF DYNAMIC OUTSOURCING SERVICES ( DOS ) AND ITS BUSINESS SOLUTIONS DOS Business Presentation_

Size: px
Start display at page:

Download "OVERVIEW OF DYNAMIC OUTSOURCING SERVICES ( DOS ) AND ITS BUSINESS SOLUTIONS DOS Business Presentation_26082013"

Transcription

1 OVERVIEW OF DYNAMIC OUTSOURCING SERVICES ( DOS ) AND ITS BUSINESS SOLUTIONS

2 About Dynamic Outsourcing Services Dynamic Outsourcing Services (DOS) is one of Cambodia s fastest growing businesses in the outsourcing market and is proud to build upon Cambodia's growing Services Industry. DOS was founded by Mr. Dana Vadhana Sreng, a former Head of Customer Operations for a leading telecommunication provider in Cambodia. Mr Sreng has brought together a highly skilled team of telesales/telemarketing and customer relationship professionals with many years of combined experience in sales and customer service. DOS offers many outsourcing services including:- In-Bound Calling Out- Bound Calling Data Entry Image Scanning Training Services Call Centre Solutions Collection Services Help Desk & Tech Support Market Research & Surveys Directory Services Cambodia is not only cost-effective, but it also provides a high level of productivity and quality of work. Furthermore, the people have many language capabilities covering English, Chinese, Japanese, Korean, Vietnamese, Thai, and French.

3 Our Group Services 1. Call Center Services (Inbound/Outbound) 2. Data Entry and Scanning 3. Training Services 4. E-Training Solutions 5. Call Center Solutions 6. IT Services 7. Directory Services

4 1. Call Center Services With experienced and professional skills we offer call center outsourcing services both inbound and outbound: Customer Care Market Research Telesales & Telemarketing Back Office Administration Help Desk Outsourcing, Remote Technical Support Collection Services

5 2. Data Entry & Scanning Services Our operators have many years of experience in their specific fields which include: Data Entry Services Single Entry and Double Entry Online Data Entry Offline Data Entry Copy Paste Services Web Research Data Processing Services Form Processing Data Conversion Check Processing Insurance Claim Entry Insurance Claim Processing Image Processing Services Scan and Index Scan from /to Microfilm Image cropping, resize Image Processing OCR and OCR Clean Up HTML/ML/File/Data & Media Conversion Book Conversion Convert hard copy to e-book Convert from image to e-book Design page layout for reprint Bookmark

6 3. Training Services Dynamic Outsourcing Services offers call center training services to management and staff on: 1. Quality Customer Services 2. Effective telephone communication 3. Effective Telesales agent 4. Escalation procedure 5. Data Management 7. Reporting 8. Support

7 4. e-training Solutions In today s world, online e-training is a valuable asset to any organization. It is cost-effective and allows for continuous and updated education. It is proven to enhance productivity with employees and assists to develop knowledge and motivation in employees to build a successful business. DOS in association with its Australian partners is pleased to offer TEAMS: (Training Evaluation Audit Management Software) that has been developed to provide organizations with an online Learning management System ( LMS ). What is TEAMS? online training material Provides organizations with cutting edge software that allows a web based e-learning platform that is compatible with I-Pads, touch screens, I- phones and current day browsers. The platform provides high-quality, engaging, interactive multimedia presentations and courseware for certification and standards-based learning. It is tailored as we take YOUR company training material and incorporate it into the web based LMS platform. Our marketing studio can help you develop customized online training material.

8 5. Call Center Solutions Dynamic Outsourcing Services offers complete call center solutions from start up to growth solutions. 1. Call Center Assessment 2. Hardware Supply and Installation 3. Software Installation 4. Call System Installation and Configuration 5. Staff Training 6. Data Management 7. Reporting 8. Support

9 6. IT Services Dynamic Outsourcing Services offers IT services to all industries and government department both local and international : 1.Site Assessment and Flow plan 2.Hardware supplies 3.Network Architecture/ Installation/Connection 4.Network Infrastructure Solutions and Support 5.DNS Name Servers 6.DHCP Servers 7.Web Servers 8. Servers 9.Proxy Servers 10.File/Print Servers 11.Directory Servers 12.Authentication 13.Server Data Backups 14.New Software Installation

10 7. Directory Services Our dedicated team of agents have received extensive customer service training and are equipped to handle a diverse customer base and assist with a variety of customer needs and requests, including: Directory Assistance (DA) - Customers can reach Directory Assistance agents by dialing 1200 and receive a local government and business listing. Enhanced Directory Assistance (EDA) - Customers can reach Enhanced Directory Assistance agents 1200, receive business category and information services such as movie listings, weather reports and forecasts, and point to point driving directions. Advisory Service Customer can get connected, through Dynamic Outsourcing Services, to Advisory Service Bureau on various matter including government and non-government organizations.

11 DOS Accomplishments: We have provided ongoing outbound telesales activities, for one of the leading telecom company, to more than 500,000 customers with approx 50% effective call rate, of which approx $450,000 sales have been converted over an 8 month period. We have also made approx 900,000 telemarketing calls and 360,000 shorts projects calls (for the same telecom company) resulting in a positive outcome, including higher customer retention rate. We have helped one of the leading banks set up an in-house call centre, including staff training. We re providing document processing and data entry services to one of the leading banks Built an effective management team with industry experience. Set up premises and technology. Established a program, providing a three month internship for university graduates and NGO vocational training center students, including people with disabilities.

12 Why Select DOS Business Benefit Help clients focus on core business Improve standard services with quality systems based on ISO Cost savings Time savings Experienced staff Scalability Flexibility Best technical support Share risk Management capacity Technology know-how Social Benefit Jobs for under privilege people Disable persons Poor students from rural areas Equality opportunity job Training opportunity for young people By creating multiple employment opportunity, DOS is contributing to economic development and poverty reduction Also benefit from our key resources and Cambodia business Network

13 Corporate Social Responsibility A unique aspect of the DOS business is that it is a supporter to recruit people with disabilities. Sreng Dana, CEO of DOS, firmly believes in equal opportunities for everyone and sees DOS as the perfect way for those who are either handicapped or financially disadvantaged to join the workforce and provide them with a more sustainable future. At present approximately 20% of DOS workforce have some form of disability, yet not effecting their ability to perform their role. DOS also employs students who are from poorer rural/provincial communities.

14 Your concerns are our concerns Quality We have a skilled professional team, equipped with reliable support systems to carry out all types of BPO activities. Our Quality Management System ensures standard performance that is equivalence to International Standard ISO 9001:2000. Confidentiality Internal codes of conduct, agreement with our staff and monitoring systems ensures that all processes and information is kept confidential. Security DOS uses secure communications to transfer all information and all data is encrypted. We use a variety of security technologies and procedures to help protect information from unauthorized access, use, and disclosure. For example, we have security log in/out protocols, firewalls, limited printing by authority, limited system access by authority, and facilities located in controlled location. Price Our competitive price for high quality and reliable services is best in the region.

15 (There are more people with disabilities not included in this photo)

16 Thank You Contact: Office: #23 KT Tower Suite 703, St. 112, Phsa Depo, Toulkork Phnom Penh, Cambodia

SaaS Partner Solutions

SaaS Partner Solutions ADAM Software is the global provider of DAM software for the enterprise Our SaaS Partners network create and deliver ADAM-based SaaS solutions ADAM Software SaaS Partner Solutions ADAM Software Contents

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

H.I.P.A.A. Compliance Made Easy Products and Services

H.I.P.A.A. Compliance Made Easy Products and Services H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 Info-HIPAA@prevare.com 877-232-9191 Dear Health Care Professional,

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

Maximize potential with services Efficient managed reconciliation service

Maximize potential with services Efficient managed reconciliation service RECONCILIATION IntelliMatch Operational Control services Optimize. PRODUCT SHEET Maximize potential with services Efficient managed reconciliation service Overview At its best, technology provides financial

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Mobile Admin Architecture

Mobile Admin Architecture Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile

More information

Remote Infrastructure Support Services & Managed IT Services

Remote Infrastructure Support Services & Managed IT Services Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The

More information

How To Use Uniflow

How To Use Uniflow One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in

More information

Cloud models and compliance requirements which is right for you?

Cloud models and compliance requirements which is right for you? Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,

More information

METRO REGIONAL GOVERNMENT Records Retention Schedule

METRO REGIONAL GOVERNMENT Records Retention Schedule Program: Administration IS Administration provides strategic planning, direction, and central management oversight of the Information Services that includes the following programs: Desktop Support Services,

More information

penelope athena software SOFTWARE AS A SERVICE INFORMATION PACKAGE case management software

penelope athena software SOFTWARE AS A SERVICE INFORMATION PACKAGE case management software penelope case management software SOFTWARE AS A SERVICE INFORMATION PACKAGE athena software "I've worked with major corporations and universities and I am really impressed with Athena's hosted server and

More information

HELP DESK C D M S F I R S T. C O M ADVANTAGES TECHNICAL HELP DESK CHARACTÉRISTICS CHARACTERISTICS. Always there to help you

HELP DESK C D M S F I R S T. C O M ADVANTAGES TECHNICAL HELP DESK CHARACTÉRISTICS CHARACTERISTICS. Always there to help you TECHNICAL HELP DESK CHARACTÉRISTICS HELP DESK Always there to help you With the emergence of specialized technologies such as network remote access, Virtualization, Intranets and Extranets, wireless networks,

More information

Standard: Event Monitoring

Standard: Event Monitoring Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information

More information

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,

More information

Cybersecurity Health Check At A Glance

Cybersecurity Health Check At A Glance This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not

More information

Consensus Policy Resource Community. Lab Security Policy

Consensus Policy Resource Community. Lab Security Policy Lab Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

Technical Proposition. Security

Technical Proposition. Security Technical Proposition ADAM Software NV The global provider of media workflow and marketing technology software ADAM Software NV adamsoftware.net info@adamsoftware.net Why Read this Technical Proposition?

More information

uturenet & its Document Imaging Services

uturenet & its Document Imaging Services F uturenet & its Document Imaging Services FutureNet Technologies Corporation has become a vital player in the healthcare information management industry. Founded in 1996, FutureNet was formed for the

More information

Cisco Unified MobilityManager Version 1.2

Cisco Unified MobilityManager Version 1.2 Cisco Unified MobilityManager Version 1.2 Cisco Unified MobilityManager Version 1.1, Release 1.2 The Cisco Unified Communications system of voice and IP communications products and applications enables

More information

One platform for all your print, scan and device management

One platform for all your print, scan and device management One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in

More information

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules) MCITP Windows 2008 Enterprise Edition is considered as Microsoft s most reliable, scalable and high-performing server operating system. It has been designed to simplify the process of Migration from the

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led Course Description Whether you are looking to learn new technology, gain Server 2008 certification, or simply improve your

More information

COCOS HOSTING (Hosting and outsourcing on the COCOS infrastructure)

COCOS HOSTING (Hosting and outsourcing on the COCOS infrastructure) COCOS HOSTING (Hosting and outsourcing on the COCOS infrastructure) Simplifying Customer Interaction Management with the leading edge technology, best Customer Service and optimum costs. COCOS Hosting

More information

COMPANY PROFILE. Company Profile Dial a Service, Uganda LTD Page 1

COMPANY PROFILE. Company Profile Dial a Service, Uganda LTD Page 1 2013 COMPANY PROFILE Company Profile Dial a Service, Uganda LTD Page 1 Dial-a-Service Company Profile Company Name: Dial-a-Service Uganda Ltd. Date of Establishment: September 2008 Managing Director: Business

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality

More information

IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY

IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY IS YOUR INFORMATION SECURE? Secure and reliable ICT. Our experience. Your benefit. SWISS CYBER SECURITY Security Services Identify and reduce risks The reliable protection of your assets information, workforce,

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

Configuring Windows Server 2008 Active Directory

Configuring Windows Server 2008 Active Directory Configuring Windows Server 2008 Active Directory Course Number: 70-680 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-680: TS: Windows 7, Configuring

More information

Hardware and Software Requirements for Server Applications

Hardware and Software Requirements for Server Applications Hardware and Software Requirements for Server Applications IVS Enterprise Server Version 11.3+ RMG Networks Holding Corporation All Rights Reserved. Rev 9/14 TABLE OF CONTENTS INTRODUCTION...3 Minimum

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

1B1 SECURITY RESPONSIBILITY

1B1 SECURITY RESPONSIBILITY (ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,

More information

Smart Link. Profile. www.smartlink.com.sa

Smart Link. Profile. www.smartlink.com.sa Smart Link Profile www.smartlink.com.sa Overview SMART LINK is proud to be the largest outsourcing contact center in Saudi Arabia. We have all needed knowledge and experience to cover a wide variety of

More information

Exchange-based email. Types of email. Why use Exchange for email?

Exchange-based email. Types of email. Why use Exchange for email? Exchange-based email Types of email POP3 Exchange Lotus Notes Squirrel mail Pine They are all pretty basic and limited except Exchange email. Lotus Notes has lots of functionality, but it s a big pain

More information

custom hosting for how you do business

custom hosting for how you do business custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide

More information

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...

More information

EXIN Cloud Computing Foundation

EXIN Cloud Computing Foundation Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing

More information

The Windows Server family of products

The Windows Server family of products The Windows Server family of products Regardless of the size and stage of your company, Windows Server solutions will help you reach the next step to success. With products designed to meet the varying

More information

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an

More information

White Paper A COMPARISON OF HOSTED VOIP AND PREMISES- BASED IP PHONE SYSTEMS FOR IT AND TELECOM DECISION MAKERS. Executive Summary

White Paper A COMPARISON OF HOSTED VOIP AND PREMISES- BASED IP PHONE SYSTEMS FOR IT AND TELECOM DECISION MAKERS. Executive Summary A COMPARISON OF HOSTED VOIP AND PREMISES- BASED IP PHONE SYSTEMS FOR IT AND TELECOM DECISION MAKERS Executive Summary Using the same technology that moves data, text and images around the global Internet,

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

70-642 R4: Configuring Windows Server 2008 Network Infrastructure

70-642 R4: Configuring Windows Server 2008 Network Infrastructure 70-642 R4: Configuring Windows Server 2008 Network Infrastructure Course Introduction Chapter 01 - Understanding and Configuring IP Lesson: Introducing the OSI Model Understanding the Network Layers OSI

More information

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. PREMIER SUPPORT

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES Network Security 6-005 INFORMATION TECHNOLOGIES July 2013 INTRODUCTION 1.01 OSU Institute of Technology (OSUIT) s network exists to facilitate the education, research, administration, communication, and

More information

INFORMATION SECURITY California Maritime Academy

INFORMATION SECURITY California Maritime Academy CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:

More information

Translating technology into your business

Translating technology into your business Business Solutions Who are we? Translating technology into your business 20+ years of experience in the field of digital communications. Everything is CHANGING Everything in our business environment is

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

McAfee Next Generation Firewall (NGFW) Administration Course

McAfee Next Generation Firewall (NGFW) Administration Course McAfee Product Education McAfee Next Generation Firewall (NGFW) Administration Course The McAfee NGFW Administration course from Education Services provides attendees with hands-on training on the design,

More information

ORACLE TUTOR. Oracle Tutor provides organizations with powerful tools to develop,

ORACLE TUTOR. Oracle Tutor provides organizations with powerful tools to develop, ORACLE TUTOR ORACLE TUTOR Oracle Tutor provides organizations with powerful tools to develop, Why Document Procedures? Increase staff productivity Reengineer or improve business practices Implement new

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

Business and enterprise cloud sync, backup and sharing solutions

Business and enterprise cloud sync, backup and sharing solutions Business and enterprise cloud sync, backup and sharing solutions Private Cloud Synchronization Collaboration Backup / Versioning Web Access Mobile Access LDAP / Active Directory Federated RADIUS Single

More information

USM IT Security Council Guide for Security Event Logging. Version 1.1

USM IT Security Council Guide for Security Event Logging. Version 1.1 USM IT Security Council Guide for Security Event Logging Version 1.1 23 November 2010 1. General As outlined in the USM Security Guidelines, sections IV.3 and IV.4: IV.3. Institutions must maintain appropriate

More information

The Essential Security Checklist. for Enterprise Endpoint Backup

The Essential Security Checklist. for Enterprise Endpoint Backup The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing

More information

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,

More information

Department of Software Engineering

Department of Software Engineering University of Engineering and Technology, Taxila Department of Software Engineering Software Technologies Incubation Center (STIC) Microsoft Certified System Engineer (MCSE) Workshop (Windows Server 2003)

More information

Network Administration and Design Program Syllabus

Network Administration and Design Program Syllabus Network Administration and Design Program Syllabus 51 U.S. Route 1, Suite K, Scarborough, ME 04074 Total In Class Clock Hours: 850 Assigned Course Preparation Clock Hours: 230 Academic Credits: 42 Prerequisites:

More information

Call Center. Enhance Customer Relation. Eliminate Call Center Complexity and Reduce Costs. Improve Call Center Performance

Call Center. Enhance Customer Relation. Eliminate Call Center Complexity and Reduce Costs. Improve Call Center Performance Call Center Enhance Customer Relation Eliminate Call Center Complexity and Reduce Costs Improve Call Center Performance Get Call Center, Soft Phone, IVR, Predictive Dialer, Call Recording, Quality Management

More information

FIREWALL POLICY DOCUMENT

FIREWALL POLICY DOCUMENT FIREWALL POLICY DOCUMENT Document Id Firewall Policy Sponsor Laura Gibbs Author Nigel Rata Date May 2014 Version Control Log Version Date Change 1.0 15/05/12 Initial draft for review 1.1 15/05/14 Update

More information

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy. Abstract This paper addresses the methods and methodologies required to develop a corporate security policy that will effectively protect a company's assets. Date: January 1, 2000 Authors: J.D. Smith,

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Configuring and Administering Windows 7

Configuring and Administering Windows 7 Configuring and Administering Windows 7 Length: 5 days Overview This five-day instructor-led course provides students with the knowledge and skills to configure and administer Microsoft Windows 7 as a

More information

Maruleng Local Municipality

Maruleng Local Municipality Maruleng Local Municipality. 22 November 2011 1 Version Control Version Date Author(s) Details 1.1 23/03/2012 Masilo Modiba New Policy 2 Contents ICT Firewall Policy 1 Version Control.2 1. Introduction.....4

More information

Data Stored on a Windows Server Connected to a Network

Data Stored on a Windows Server Connected to a Network Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Server Connected to

More information

Document Management Solutions

Document Management Solutions TM SCAN SOLUTIONS Efficient, Flexible, Powerful, Cost-Effective Document Management Solutions Introduction About Pearl Scan Pearl Scan Solutions Ltd is one of the leading providers of document management

More information

Course 50322B: Configuring and Administering Windows 7

Course 50322B: Configuring and Administering Windows 7 Course 50322B: Configuring and Administering Windows 7 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course provides students with the knowledge

More information

Privacy and Outsourcing

Privacy and Outsourcing Privacy and Outsourcing Doron Rotman, National Privacy Service Leader August 2007 ADVISORY You can outsource liability you can t outsource responsibility and accountability! 1 1 Introduction Sourcing defined

More information

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution. Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR

More information

White Paper. BD Assurity Linc Software Security. Overview

White Paper. BD Assurity Linc Software Security. Overview Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

Workforce Management IVR. A multi-service voice platform

Workforce Management IVR. A multi-service voice platform WFM Workforce Management IVR Information Sheet Introduction High Level Overview Features Solution Components Industries Applications Call Flows Reporting Implementation and Deployment About Syntellect

More information

Data Stored on a Windows Computer Connected to a Network

Data Stored on a Windows Computer Connected to a Network Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Computer Connected to

More information

IT SERVICE MANAGEMENT FAQ

IT SERVICE MANAGEMENT FAQ IT SERVICE MANAGEMENT FAQ Version: 1.3 Date: February 2011 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Data Stewardship... 4 2.1 Where is the data stored?... 4 2.2 Who controls the data?... 4 2.2

More information

Business Profile(BPO Division)

Business Profile(BPO Division) Business Profile(BPO Division) Krystal Integrated Services Pvt. Ltd. Krystal Integrated Services Pvt. Ltd., in response to ever increasing need of High quality business with minimum cost formed a Business

More information

Practice law, not IT. You can save costs while outsourcing to the US law firm technology experts!

Practice law, not IT. You can save costs while outsourcing to the US law firm technology experts! Practice law, not IT. You can save costs while outsourcing to the US law firm technology experts! Project Leadership Associates, Inc. (PLA), the largest provider of business and technology consulting services,

More information

Address Verification Communication Services. CAF Pickup Insurance. Time base Dunning (Collections Health care. Outbound) Business Development

Address Verification Communication Services. CAF Pickup Insurance. Time base Dunning (Collections Health care. Outbound) Business Development Business Profile Krystal Integrated Services Pvt. Ltd. BPO Division Krystal Integrated Services Pvt. Ltd., in response to ever increasing need of High quality business with minimum cost formed a Business

More information

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF

Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

One Platform for all your Print, Scan and Device Management

One Platform for all your Print, Scan and Device Management One Platform for all your Print, Scan and Device Management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in

More information

Future Cloud Services: Ricoh s Perspective

Future Cloud Services: Ricoh s Perspective White Paper Future Cloud Services: Ricoh s Perspective Under current unstable business conditions, where to provide management resources is important to a company s future. In such an environment, cloud

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe Agenda Who Is VendorSafe Technologies? It Won t Happen to Me! PCI DSS Overview The VendorSafe Solution Questions

More information

CareGiver Remote Support Information Technology FAQ

CareGiver Remote Support Information Technology FAQ CareGiver Remote Support Information Technology FAQ CareGiver remote support Information Technology FAQ Purpose The purpose of this document is to answer Frequently Asked Questions (FAQs) regarding CareGiver

More information

VoIPon www.voipon.co.uk sales@voipon.co.uk Tel: +44 (0)1245 808195 Fax: +44 (0)1245 808299

VoIPon www.voipon.co.uk sales@voipon.co.uk Tel: +44 (0)1245 808195 Fax: +44 (0)1245 808299 VoiceGear/3CX Integration Guide Ver.0.1 Page 2 1. OVERVIEW... 3 1.1 SETTING UP 3CX PBX...4 1.2 SETTING UP VOICEGEAR GATEWAY...5 2. VOICEGEAR-3CX SIP INTEGRATION... 6 2.1 3CX CONFIGURATION...7 2.2 VOICEGEAR

More information

Configuring Windows Server 2008 Network Infrastructure

Configuring Windows Server 2008 Network Infrastructure Configuring Windows Server 2008 Network Infrastructure Course Number: 70-642 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-642: TS: Windows Server

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

Alcatel-Lucent OmniGenesys Contact Center Transforming your business with a new generation of customer service

Alcatel-Lucent OmniGenesys Contact Center Transforming your business with a new generation of customer service Alcatel-Lucent OmniGenesys Contact Center Transforming your business with a new generation of customer service Software and hardware are only valuable because they work as a system * *Carl Shapiro, Harvard

More information

www.flatworldsolutions.com

www.flatworldsolutions.com Flatworld Solutions Pulitzer-award-winning writer Thomas Friedman in his book The World is Flat has described the flatteners that shaped the 21st century global economy. These flatteners, allowed us to

More information