IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM Spam White Papers (View All Report Types)
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Cyber Threat Intelligence Buyers Guide
sponsored by Digital Shadows
WHITE PAPER: This white paper provides an overview of current cyber threat intelligence approaches and types of offerings available. It looks at the rise of digital business in today's world and at the impact that threat intelligence has had on the market.
Posted: 09 Feb 2016 | Published: 27 Jan 2016

Digital Shadows

Continuous Third-Party Security Monitoring Powers Business Objectives and Vendor Accountability
sponsored by BitSight
WHITE PAPER: This white paper discusses attitudes and capabilities regarding third-party security compliance of enterprise IT security decision-makers in the US, UK, France and Germany.
Posted: 03 Feb 2016 | Published: 31 Jan 2015

BitSight

The Top 5 Technology Headaches Hindering Innovation Today
sponsored by Dell, Inc.
WHITE PAPER: In this paper, you will address the 5 more onerous issues holding CIOs back from delivering real value and reliability from their IT support. Read on now to discover the mobile headaches of your workplace, and learn how to deliver flexibility for cloud workloads and ensure reliable performance for IoT.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Dell, Inc.

End Point Lightboard
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, you will read about the battle security pros fight every day and what new tools they are using to stop hackers.
Posted: 11 Feb 2016 | Published: 31 Aug 2015

Palo Alto Networks

Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: This white paper explores cyber situational awareness and presents a three-staged approach to incorporate cyber situational awareness into your defenses.
Posted: 05 Feb 2016 | Published: 31 Jan 2016

Digital Shadows

Top 6 Cyber Security Threats to iOS Devices
sponsored by Kingpin Communications
WHITE PAPER: This white paper details the six most common types of attacks that impact iOS mobile devices. Access now and you'll learn the basic requirements for protecting against them.
Posted: 11 Feb 2016 | Published: 25 Jun 2015

Kingpin Communications

Using Trend Micro’s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance
sponsored by TrendMicro
WHITE PAPER: This white paper examines a platform that delivers a comprehensive set of security controls optimized for modern data centers and the cloud.
Posted: 04 Feb 2016 | Published: 30 Apr 2015


Mobile Malware Hits ActiveSynch-Only Devices
sponsored by MobileIron
WHITE PAPER: In this white paper, learn about four major threats to mobile device security, including: Stagefright, XcodeGhost, and 2 more. Additionally, learn how an enterprise mobility management provider can protect your business by detecting and mitigating threats to mobile devices.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

A Fortune 200 Global Manufacturing Services Company
sponsored by Digital Guardian
WHITE PAPER: This white paper tells the success story of Jabil, a company struggling with data visibility issues.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement