IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM Spam White Papers (View All Report Types)
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Mobile Device Management for Retail
sponsored by IBM
WHITE PAPER: Access this white paper to learn about the new age of mobility in the retail space, as well as how to overcome security challenges with centralized device control, compliance, system updates, and disaster recovery.
Posted: 13 Jul 2015 | Published: 26 Dec 2014

IBM

Securing the Enterprise: 5 Key IT Challenges
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the five main challenges facing security professionals today. Read on to learn more about the causes of these security problems – and how you can overcome them.
Posted: 21 Jul 2015 | Published: 31 Dec 2013

Symantec Corporation

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

The Identity Imperative in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Read this white paper to discover the importance of identity management in the cloud and to learn how you can maintain security despite the rapidly disappearing network perimeter.
Posted: 16 Jul 2015 | Published: 31 Mar 2015

Symantec Corporation

10 Steps for Protecting Executives Using Cyber Threat Intelligence
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper analyzes how social engineering and other technologies can help criminals to target your business's executives and assets, and it suggests ten ways you can protect them.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Geek Guide: Apache Web Servers and SSL Authentication
sponsored by GeoTrust, Inc.
WHITE PAPER: This guide walks through what SSL/TLS is (and isn't), how you can create or buy a certificate, how to install that certificate into an Apache server and then how to configure Apache such that a subset of URLs on your system are covered by SSL.
Posted: 15 Jul 2015 | Published: 01 Jul 2015

GeoTrust, Inc.

Tivoli Workload Automation with Cloud: Automating Complex Applications and Worloads in the Cloud
sponsored by IBM
WHITE PAPER: Read this research report to learn how automating complex applications and workloads in the cloud can drive down costs and improve efficiency, productivity and usability.
Posted: 06 Jul 2015 | Published: 30 Apr 2013

IBM

Defend Web Properties from Modern Threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the challenges of defending modern web app properties from modern threats, and discover how you can benefit from deploying an application delivery controller (ADC).
Posted: 27 Jul 2015 | Published: 30 Jan 2015

Citrix

For Healthcare IT, It’s All About ROI
sponsored by Hyland Software
WHITE PAPER: Technology must empower clinicians and staff, at their respective hospitals and health systems, to provide quality care and deliver better service. Access this white paper and learn how IT strategies can bring business value to your healthcare organization.
Posted: 09 Jul 2015 | Published: 31 Dec 2014

Hyland Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement