IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure IM

RSS Feed    Add to Google    Add to My Yahoo!
Secure IM Multimedia (View All Report Types)
 
Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.

Emerging Threats: New Techniques and Countermeasures
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom outlines the top threats in 2015 from social media engineering and waterholes to third-party attacks and credit card fraud.
Posted: 21 Apr 2015 | Premiered: 27 Apr 2015

SearchSecurity.com

Empowering Customers with 'People-Centric IT'
sponsored by RES Software
VIDEO: The following resource introduces RES IT Store, an IT service delivery platform that can allow businesses to deliver services to both users and IT by giving users an easy-to-use, self-service IT portal where they can interact with IT without delay, and while allowing the delivery of services when needed without manual intervention.
Posted: 05 Jun 2015 | Premiered: 05 Jun 2015

RES Software

3 Capabilities Found Within a Solid ITSM Strategy
sponsored by Absolute Software
VIDEO: This brief video highlights technologies that enable ITSM approaches based on practices defined within the ITIL. Tune in and learn the capabilities of a solid ITSM plan.
Posted: 08 May 2015 | Premiered: 08 May 2015

Absolute Software

Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall
sponsored by Trend Micro
WEBCAST: This webcast can help you keep yourself safe from ransomware and mitigate it if you do come under attack.
Posted: 11 May 2015 | Premiered: Jan 21, 2015

Trend Micro

Uncover the Abnormal with Anomaly Detection
sponsored by Prelert
WEBCAST: This webcast shows you how to uncover abnormal network behavior with the help of security analytics and anomaly detection.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Mobile Security Matures: Managing the new mobile enterprise 2.0
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn strategies for effectively adapting and satisfying end-users' growing BYOD demands, while still allowing for enterprise IT to securely control desktop and application delivery, without exposing your organization to security threats.
Posted: 04 Jun 2015 | Premiered: 01 Jun 2015

SearchSecurity.com

Understand the Drivers Behind Hybrid Cloud Adoption
sponsored by Peer1
VIDEO: Tune into this video to discover the biggest drivers behind hybrid cloud adoption.
Posted: 22 May 2015 | Premiered: 22 May 2015

Peer1
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement