IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Spim

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Instant Messaging Spam, IM Spam
DEFINITION: Spam delivered through instant messaging.
Spim Multimedia (View All Report Types)
26 - 50 of 482 Matches Previous Page  |  Next Page
Are You Fully Prepared for Shellshock?
sponsored by Dell Software
WEBCAST: Join this webinar for technical insight into Shellshock, and learn what you can do to protect networks and Linux-based devices from attacks.
Posted: 25 Nov 2014 | Premiered: Nov 25, 2014

Dell Software

AVG Content Filtering - Now Get 50% Off on Any 12- or 24-Month Subscription
sponsored by AVG Technologies
PRODUCT DEMO: This complimentary IT downloads lets you try a cloud content filtering solution for yourself.
Posted: 22 Dec 2014 | Premiered: 22 Dec 2014

AVG Technologies

AVG Managed Workplace 9.0 - Exclusive 2 for 1 Offer: Buy One License, Get One License Free
sponsored by AVG Technologies
PRODUCT DEMO: Download this exclusive product demo to learn about a remote monitoring and management platform with an easy-to-use, web-based console and a pay-as-you-go model.
Posted: 22 Dec 2014 | Premiered: 22 Dec 2014

AVG Technologies

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL TRADESHOW: Access this resource to learn how to optimize operations, performance, analytics, automation and delivery of your IT services in today's complex on-premise, hybrid and cloud environments. You'll be able to select from a wide array of content in different media formats to help you make smarter decisions now and for your organization's future.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

IBM

Be a Superhero: Use Application & Infrastructure Visibility to Gain Competitive Advantage
sponsored by IBM
VIRTUAL ENVIRONMENT: Access this resource to learn how IBM can help you with the Operations, Performance, Analytics, Automation and Delivery of your IT services in today's complex on-prem, hybrid and cloud environments. You'll be access a wide array of content in different media format to help you make smarter decisions now and for your organization's future.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

IBM

Best Practices for Enterprise Data Protection in the Cloud
sponsored by Druva Software
WEBCAST: Watch this webcast to get advice from a panel of cloud service provider CEOs and cloud experts. The panel provides the best practices for protecting enterprise data in the cloud.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014, 01:01 EDT (05:01 GMT)

Druva Software

Best Practices to Secure your Virtual App & Desktop Solutions
sponsored by Citrix
WEBCAST: This exclusive webcast will detail how you can keep your virtual applications and desktop solutions safe.
Posted: 27 Jan 2015 | Premiered: Oct 14, 2014

Citrix

Beth Israel & CommVault - Customer Testimonial
sponsored by CommVault
VIDEO: Access this video to learn how a storage solution enables a hospital to manage the entire lifecycle of their data and make it secure and accesible needed.
Posted: 10 Nov 2014 | Premiered: 22 Feb 2013

CommVault

Business Transformation is needed for the New Style of IT
sponsored by Hewlett-Packard Limited
WEBCAST: In this on-demand video, learn how you can embrace a new style of IT by transforming your business and its processes with the right technology partner.
Posted: 11 Feb 2014 | Premiered: Nov 18, 2013

Hewlett-Packard Limited

Applied Analytics — Turning Data into Answers
sponsored by Virtual Instruments
VIDEO: Watch this informative video now to find out how one industry-leading tool utilizes analytics to turn data into answers – all in real-time.
Posted: 10 Jun 2014 | Premiered: 10 Jun 2014

Virtual Instruments

AppSense DataNow
sponsored by AppSense
VIDEOCAST: Learn how your organization can provide instant access to work documents from mobile devices. This videocast presents a solution that extends your IT infrastructure out into the mobile world in minutes.
Posted: 19 Jun 2012 | Premiered: Jun 19, 2012

AppSense

Automating Resource Monitoring with Robot/CONSOLE
sponsored by Help/Systems
WEBCAST: Using Robot/CONSOLE, we’ll show you how you can streamline your run book, eliminate manual tasks, and make your operations team more responsive to your critical business processes. Watch this FREE 30-minute Webcast and learn how Robot/CONSOLE can solve the headaches of resource monitoring.
Posted: 28 Apr 2010 | Premiered: Apr 28, 2010

Help/Systems

Automating User Provisioning: A User’s Perspective
sponsored by Oracle Corporation
WEBCAST: Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs.
Posted: 09 Mar 2011 | Premiered: Apr 12, 2011, 14:00 EDT (18:00 GMT)

Oracle Corporation

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Balancing Risk with Agility: Best Practices for Securing Cloud Deployments
sponsored by Trend Micro
WEBCAST: Join a webinar hosted by Lauren E. Nelson, Lead Cloud Analyst, Forrester Research and Mark Nunnikhoven, Principal Engineer, Trend Micro on May 28, 2014 at 12PM EST for best practices to better secure cloud applications and data while minimizing cost and complexity.
Posted: 30 Apr 2014 | Premiered: May 28, 2014, 12:00 EDT (16:00 GMT)

Trend Micro

Best for Business: Security and Manageability on the Chip
sponsored by Intel Corporation
SOFTWARE DEMO: This demo explains how to secure and manage notebooks with Intel Centrino2 with vPro technology and desktops with Intel Core 2 processors with vPro technology.
Posted: 12 Aug 2008 | Premiered: 11 Aug 2007

Intel Corporation

Better cloud security with certificate and key management
sponsored by Venafi
WEBCAST: This webcast explores how key management can help you overcome the data security challenges of cloud computing. Inside, discover the best practices for automating certificate management – click through to view now.
Posted: 09 Nov 2012 | Premiered: Nov 9, 2012

Venafi

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

BlackBerry Security Response - Protecting Your Deployments
sponsored by BlackBerry
WEBCAST: This exclusive webcast examines how you can secure your mobile environment, protecting your deployments and ensuring that your sensitive mobile data remains in the right hands.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

BlackBerry

Brian Madden and BlackBerry's Alan Panezic discuss BlackBerry Mobile Fusion, Balance, and PlayBook 2.0
sponsored by BlackBerry
VIDEO: Watch this 10 minute video to hear Brian Madden, blogger, and Alan Panezic, VP of Enterprise Product Management from BlackBerry, discuss the new offerings BlackBerry is giving to make sure employers and employees are happy with their mobile device capabilities.
Posted: 24 Feb 2012 | Premiered: 24 Feb 2012

BlackBerry

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

BSR Podcast: Obamacare, the Cloud's impact and more
sponsored by CA Technologies.
PODCAST: Today's businesses depend on IT to deliver competitive advantage and superior user experiences, and with business service reliability, you can do just that. But how do you leverage this concept to not only ensure application availability, but end-to-end service reliability? Tune in to this podcast and find out.
Posted: 09 Jan 2014 | Premiered: Nov 20, 2013

CA Technologies.

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Building Secure Private Clouds with VMware vCloud Director
sponsored by VMware, Inc.
WEBCAST: VMware vCloud Director gives you the ability to build secure private clouds that greatly increase datacenter efficiency and business agility. Coupled with VMware vSphere, VMware vCloud Director delivers cloud computing for existing datacenters by pooling virtual infrastructure resources and delivering them to users as catalog-based services.
Posted: 25 Apr 2011 | Premiered: Apr 25, 2011

VMware, Inc.

Business Process Management and Enterprise Architecture for Better Business Outcomes
sponsored by IBM
WEBCAST: This webcast explores how WebSphere and IBM Rational work together to help businesses achieve strategic objectives with reduced risk and cost and also for translating business vision and strategy into architectural change.
Posted: 16 Jun 2010 | Premiered: Jun 24, 2010, 12:00 EDT (16:00 GMT)

IBM
26 - 50 of 482 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement