IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM Spam White Papers (View All Report Types)
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Why RAD is Right for Mobile and Web Front-End Development
sponsored by OutSystems
WHITE PAPER: Discover how to deliver agile, responsive front-end applications with rapid app development (RAD). Read on to meet today's dramatically digital customer journey by upgrading your legacy stacks and mobile app strategy, learning how to overcome the challenges in adopting an open-source stack, and more.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

OutSystems

Anatomy of a Whaling Attack: Protecting Your Organization from CEO Email Scams
sponsored by Mimecast North America
WHITE PAPER: Learn the anatomy of a whaling attack – an email scam that can threaten every member of your enterprise, from entry-level to the C-suite. Download this e-book now and learn 6 ways to defend against this potentially crippling attack.
Posted: 03 Jan 2017 | Published: 03 Jan 2017

Mimecast North America

Mobile Security Addressing the Evolving Threat Landscape
sponsored by SOTI Inc.
WHITE PAPER: Discover why organizations are making the decision to move forward with a holistic security framework to mitigate risk – taking into account physical, network, device, and data (app and content level) protection.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

SOTI Inc.

Email Security in a Zero Trust World
sponsored by Mimecast North America
WHITE PAPER: Learn how your security response can't just be reactive and what the most important considerations are when looking to lock down an email strategy. Discover what you need to know about the cloud, new threats, digital businesses, and legacy security from multiple perspectives.
Posted: 11 Jan 2017 | Published: 11 Jan 2017

Mimecast North America

Reinvent Your Hardware Refresh Cycle with HCI
sponsored by VMware
WHITE PAPER: Because today's landscape of diverse apps and platforms requires a heightened need for speed and security, siloed storage systems just don't cut it. Download this resource to rejuvenate your refresh cycle with hyper-converged infrastructure (HCI) that seamlessly supports an always-on virtualized environment.
Posted: 28 Dec 2016 | Published: 28 Dec 2016

VMware

Securely Enabling A Hybrid Cloud in Microsoft Azure
sponsored by Palo Alto Networks
WHITE PAPER: This white paper offers information on a cloud solution that allows you to securely enable a hybrid cloud by incorporating security concepts that includes segmentation policies, much like the prevention techniques used on your physical network.
Posted: 16 Dec 2016 | Published: 01 Nov 2016

Palo Alto Networks

How to Gain Visibility Across Your Multi-Cloud Environment
sponsored by VMware
WHITE PAPER: Adopt an application-centric approach to cloud management. Download this resource to discover how cloud management platforms (CMP) are evolving, and how to leverage the CMP to develop and automate resource delivery across all private and public clouds.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

VMware

5 Lessons from an Application Security Pro
sponsored by Veracode, Inc.
WHITE PAPER: Learn 5 aspects of application security your peers highlighted as areas of particular concern or difficulty in a recent survey exploring how they are approaching application security and the obstacles they're facing in their approaches.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

Veracode, Inc.

Building A Scalable Remote Access Environment in AWS
sponsored by Palo Alto Networks
WHITE PAPER: Learn about a scalable remote access tool available to AWS users. Inside, you will see how you can protect your mobile workforce, as well as the network as a whole, from threats originating on the web. At the same time, you can minimize your administrative costs associated with remote access and mobile security.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

Palo Alto Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement