IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Instant Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Secure Instant Messaging Multimedia (View All Report Types)
 
Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.

Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Connecting the Server Room to the Board Room
sponsored by SurfWatch Labs
VIDEO: This video describes how an effective security intelligence application can help executives understand the security risks their business faces.
Posted: 13 Jul 2015 | Premiered: 10 Apr 2015

SurfWatch Labs

Free Demo: Enhancing Data Protection with Enterprise Storage Management
sponsored by IBM
SOFTWARE DEMO: Take a look at this free demo to discover how the right storage manager can help you overcome the challenges of enterprise data protection.
Posted: 10 Jul 2015 | Premiered: 10 Jul 2015

IBM

Unlocking the Potential of BYOD with a Mobile Device Management Service
sponsored by IBM
PRODUCT DEMO: This short video shows how one company can eliminate the stress of MDM and bring your company into the new age of mobility. View now to see how your BYOD strategy can become simple, secure, and cost-effective.
Posted: 06 Jul 2015 | Premiered: 23 Mar 2015

IBM

Point of Sale Insecurity: A Threat to Your Business
sponsored by SurfWatch Labs
WEBCAST: This webcast discusses the risks facing PoS machines and what you can do to make sure yours are secured..
Posted: 13 Jul 2015 | Premiered: Jun 9, 2015

SurfWatch Labs

Red Hat Enterprise Linux 7: Perspectives from Industry Analysts
sponsored by Red Hat
WEBCAST: In this video, Rich Fichera from Forrester, Michael Araneta, Phil Carter, and Mayur Sahni from IDC, and Laurent Lachal from Ovum outline requirements for the new era of IT, including mobile, cloud, big data, and social.
Posted: 02 Jul 2015 | Premiered: Jul 2, 2015

Red Hat

How Microsoft Enables The Anywhere Workplace
sponsored by Data#3
VIDEO: With the expansion of your mobile enterprise, it is ever-important to have mobility management solutions that support flexible work practices and enhance user experience. This webcast provides a framework for developing and implementing a successful enterprise mobility strategy.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015

Data#3

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by White Hat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement