IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Enterprise IM Security

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise IM Security Multimedia (View All Report Types)
 
Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Fact or Fiction: The Future of Email Attacks
sponsored by Symantec Hosted Services
PODCAST: In this expert podcast, Tom Bowers, Technical Editor of Information Security magazine, will confirm or debunk a number of common beliefs about what's coming next. This Podcast features a "fact or fiction"-style interview about future email-based attacks.
Posted: 27 Oct 2006 | Premiered: Oct 31, 2006, 09:00 EST (14:00 GMT)

Symantec Hosted Services

Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Top Trends Impacting IAM
sponsored by Simeio
WEBCAST: Watch this webcast to learn how to 'win' in cybersecurity as well as prepare for the future of identity and access management.
Posted: 15 Sep 2017 | Premiered: Sep 14, 2017

Simeio

From Agile Development to DevOps to DevSecOps
sponsored by Veracode, Inc.
VIDEO: It seems like organizations are still being breached left and right by cyber threats. Watch this short video to learn about a security platform that will protect your application layer by providing an end-to-end platform, cloud-based scalability, and strategic support to make application security a top priority.
Posted: 04 Aug 2017 | Premiered: 04 Aug 2017

Veracode, Inc.

The Evolution from Two-Factor Authentication to Identity Assurance
sponsored by RSA
VIDEO: Identity is today's most consequential attack vector, with 81% of confirmed data breaches involving weak, default or stolen passwords. Learn about how organizations are moving from simple two-factor authentication to modern, mobile multi-factor authentication for better identity assurance.
Posted: 31 Aug 2017 | Premiered: 29 Aug 2017

RSA

How CIOs Gain a Competitive Edge with a Service-centric Enterprise
sponsored by Atos
WEBCAST: When it comes to digital transformation, you face a myriad of challenges. IT organizations are pursuing a graduated bi-modal strategy that industrializes and automates self-service capabilities. Watch this webcast to learn about a three-step roadmap that includes practical examples, real-world use cases, and more.
Posted: 26 Jun 2017 | Premiered: Jun 26, 2017

Atos

Hacking the Smartphone: A Business Email Compromise in Action
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.
Posted: 13 Oct 2017 | Premiered: May 30, 2017

Check Point Software Technologies Ltd.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement