IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Multimedia (View All Report Types)
Ransomware, Phishing and APTs: What Can be Done About These Growing Threats
sponsored by Barracuda Networks
WEBCAST: Hear from industry experts Michael Osterman, Industry Analyst at Osterman Research, and Aj Murray, IT manager at Hayward Tyler, as well as a panel of others on the rise of, and what can be done about, ransomware, phishing, and APTs.
Posted: 20 Oct 2016 | Premiered: Oct 20, 2016

Barracuda Networks

Rx for Embedding Security into Vulnerable Healthcare Systems
sponsored by Certified Security Solutions (CSS)
WEBCAST: Learn how organizations have to revisit considerations for products and services already in use to protect data. Discover how they are satisfying regulatory or compliance requirements, remediating issues, preserve reputations and promoting a competitive advantage.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

Certified Security Solutions (CSS)

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016


Hyperconverged Infrastructure for Remote Offices
sponsored by SimpliVity
WEBCAST: This webcast addresses ways that hyper-converged infrastructure can benefit your remote offices – having consistent application performance, fast reliable data protection, maximum WAM efficiency, and better use of IT staff. Download now to learn more and see a short demo of the system.
Posted: 19 Jul 2016 | Premiered: Nov 12, 2015


How to Pass a Security Audit in One Day
sponsored by Above Security
WEBCAST: This webinar helps you understand how an effective, control-based security program can help you address audit requirements. Learn how to implement these controls and how to demonstrate their effectiveness (and not just on paper).
Posted: 23 Aug 2016 | Premiered: Aug 4, 2016

Above Security

Closing the Loop with Advanced Endpoint Protection and Forensics
sponsored by Check Point Software Technologies Ltd.
WEBCAST: You need access to insights that allow you to understand and triage attacks so you can quickly determine the path of resolution. Learn solid strategies that can help your organization secure end-user systems from today's most sophisticated attacks and zero-day threats.
Posted: 10 Jun 2016 | Premiered: Jun 10, 2016

Check Point Software Technologies Ltd.

The Business Case for Hyperconverged VDI
sponsored by Pivot3
WEBCAST: Bruce Milne, CMO of Pivot3 and David Floyer, CTO & Co-Founder of Wikibon, take a look at the current data market and how digital trends are creating the need for agile technologies. You'll explore how hyperconverged VDI compares to traditional white-box VDI strategies.
Posted: 24 Jun 2016 | Premiered: Jan 28, 2016


Making the Case for Automation
sponsored by Embotics
WEBCAST: As the virtualization infrastructures' scale increases, so too does the difficulty of management. Traditional management techniques can be rendered completely ineffective by virtual data center growth, leading to uncontrolled virtual machine sprawl and wasted hardware resources. Automation may be able to solve these issues. Tune in to learn more.
Posted: 23 Aug 2016 | Premiered: Jun 8, 2016


What Mobile Policy Suits Your Organization?
sponsored by IBM MaaS360
WEBCAST: BYOD may not be right for every organization. It takes a lot to ensure a secure and successful BYOD campaign. Watch this webinar to see how other companies are approaching BYOD and how to make sure that you can take advantage of this growing business trend.
Posted: 31 May 2016 | Premiered: Mar 31, 2016

IBM MaaS360

Webcast - Enhancing Enterprise Security in 2016 – Part 2
sponsored by Intel
WEBCAST: Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement