IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Enterprise IM Security

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise IM Security Multimedia (View All Report Types)
 
Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.

Elevate's CISO Explains Why He Switched Managed Security Providers
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service from their managed security provider and decided to look for a new one. Watch this quick, 2-minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons, and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analytics
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.
Posted: 28 Jul 2016 | Premiered: 20 Jul 2016

SearchSecurity.com

Bimodal IT: A New Philosophy for IT Service Delivery pt 1
sponsored by VMware
WEBCAST: In this webcast, Brien Posey, freelance technical writer and 14-time Microsoft MVP award winner, breaks down the advantages and disadvantages of implementing Bimodal IT. Tune in to consider the benefits of Bimodal IT, and see if it's the right choice for your data center.
Posted: 08 Jul 2016 | Premiered: Jan 1, 2016

VMware

Redefining Workspace Delivery with VMware Horizon Air Hybrid-Mode
sponsored by VMware
WEBCAST: Learn how you can transform the delivery of virtual desktops and apps through a hybrid virtual desktop strategy that combines the economic benefits of the cloud with the simplicity of hyper-converged infrastructure.
Posted: 19 May 2016 | Premiered: May 19, 2016

VMware

How to Harden Your Servers In Elastic Infrastructures
sponsored by CloudPassage
WEBCAST: Learn about security in the context of changing infrastructure from traditional data centers into environments like AWS. Find out how you can deploy systems through automation and at scale, baking in security and compliance controls while keeping these measures from putting the brakes on DevOps.
Posted: 19 Jul 2016 | Premiered: Jun 21, 2016

CloudPassage

Achieve Data Center Stability and Reliability with Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Discover how to achieve total systems stability and reliability within your data center—without sacrificing advanced capabilities—with Red Hat Enterprise Linux. Tune into this video to invest in IT budget-friendly, open-source data center automation, leaving your admins to focus on value-added projects for your business.
Posted: 14 Jul 2016 | Premiered: 02 Jul 2014

Red Hat

Hackers Aren't As Picky As You Think
sponsored by Verizon
VIDEO: Discover the first truth of network security: Malicious actors are mostly out for low-hanging fruit. With the resource found in this video, you can begin developing your plan to prevent hackers from exploiting weaknesses in your network.
Posted: 24 Jun 2016 | Premiered: 28 Apr 2016

Verizon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement