Alcatel-Lucent IP Touch 4028 3GV27060DB Benutzerhandbuch

Produktcode
3GV27060DB
Seite von 6
Alcatel-Lucent
8
SERIES Extended Edition
W h o   c a n   I   b e   f o r   y o u ?
Move on up to IP Touch for a wealth of services, from unified communication to
security, travel and meeting room management:
AM YOUR
P
ERSONAL
A
SSISTANT
Provide a single multimedia mailbox for all messages including voice, e-mail and fax*
Never miss unanswered VIP calls thanks to the call log*
Access the universal directory service easily*
Offer a “find me, follow me” facility to avoid caller frustration when trying to reach
you*
Don’t be bothered by non-urgent calls when meeting important customers*
Record time spent on the phone and produce a periodic time report by client/file or
by-the-hour billing
And a host of other features...
*Alcatel-Lucent OmniTouch Unified Communication is available on Alcatel-Lucent OmniTouch Enterprise.
AM YOUR
C
ONTACT
C
ENTER AGENT
Advanced & intuitive functionalities to boost Contact Center agents’ personal efficiency
including:
Login/logout in group + Password management
Agent status (On/Off Duty, Pause, Wrap-Up)
Group monitoring
Queue information display
Saturation indicator
AM YOUR
S
ECURITY
A
GENT
Access control: survey the entrance to the building/parking lot/remote building (video)
and control door opening from any Alcatel-Lucent IP Touch phone
Building control: for any type of alarm, directly control the building security functions
(such as closing doors to cut off a fire, alerting employees and security services)
Alarm management: immediate broadcast on IP Touch to all parties specified by
company security procedure
A
ND MUCH MORE
Remember, these existing services are just the beginning: your own applications can be
developed – by you or one of our applications partners – to customize IP Touch to the
unique demands of your business, thanks to its XML interface*.
*Not available on Alcatel-Lucent 4018 EE and 4008 EE IP Touch phones.
I
N
-
BUILT SECURITY
Rest assured, the “IP” in
Alcatel-Lucent IP Touch is fully
secured against intrusion,
eavesdropping or hacking. With
its powerful armory, you benefit
from the openness of an
applications world safe from the
risk of outside attack.