IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Instant Message Security

RSS Feed    Add to Google    Add to My Yahoo!
Instant Message Security Multimedia (View All Report Types)
Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.

DD4BC and the Rise of Extortion
sponsored by Akamai
WEBCAST: This webcast discusses the methods, capabilities, and risks cyber-extortion groups pose to your organization.
Posted: 18 Sep 2015 | Premiered: Sep 10, 2015


PCI 3.0: Top 10 Ways PCI 3.0 Will Affect Your Application Security Program
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast provides a detailed description about how the newest PCI requirements will affect your application security program.
Posted: 01 Oct 2015 | Premiered: Dec 31, 2013

WhiteHat Security

Enterprise IAM
sponsored by
VIRTUAL ENVIRONMENT: Hackers have recently launched major attacks on enterprise systems by using weaknesses in third-party vendor security. This classroom on third-party IAM explores how enterprise InfoSec pros can manage vendors who have, by the nature of their work, access to enterprise systems.
Posted: 02 Sep 2015 | Premiered: 24 Aug 2015

Selecting a SIEM: Experiences from the Trenches
sponsored by LogRhythm, Inc.
WEBCAST: This webcast features a panel discussion that will give you practical insights from SIEM veterans to help you refine your security intelligence strategy.
Posted: 06 Aug 2015 | Premiered: Aug 6, 2015

LogRhythm, Inc.

Why Partnering with the Right People is a Necessity for Channel Programs
sponsored by Schneider Electric
WEBCAST: In the following webcast, learn about the importance of partnering with an effective IT services provider and uncover where you can turn for help in deciding which partner is right for your business. Access now and ensure that your business runs smoothly, even in the wake of new IT pressures like the third platform.
Posted: 30 Sep 2015 | Premiered: Sep 22, 2015

Schneider Electric

Hybrid Cloud Security
sponsored by
VIRTUAL ENVIRONMENT: The cloud-based security services market is booming, as enterprises adopt email, Web security, and identity and access management SaaS. How can CISOs best combine cloud-based security controls with on-premises security programs? This supercast looks at the latest cloud security services and best practices.
Posted: 24 Sep 2015 | Premiered: 17 Sep 2015

ASG- Perfman: Health Insurance Provider
sponsored by ASG
VIDEO: This video examines how a major healthcare provider was able to vastly improve their ability to analyze and react to short-term and historical data by deploying Perfman.
Posted: 21 Aug 2015 | Premiered: 21 Aug 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement