IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging SpamWhite Papers (View All Report Types)
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

NSS Labs Comparative Analysis - Security Value Map
sponsored by Citrix
WHITE PAPER: Access this white paper to get a clear cut view of various web application firewalls, and learn how they stack up against one another.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Citrix

New Trends in Cloud Service Delivery
sponsored by Allot Communications Inc.
WHITE PAPER: Access this white paper to learn more about the current state of cloud service delivery. You'll learn how Quality of Service management is becoming more popular as mission-critical applications and services move to the cloud and get insight into the future of the enterprise cloud services trend.
Posted: 25 Nov 2014 | Published: 25 Nov 2014


Best Practices to Enable Mobility without Sacrificing Security
sponsored by Citrix
WHITE PAPER: This exclusive white paper can help you understand mobility and its best practices for healthcare and other large organizations. Read on to learn more.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Citrix

Gartner: Become a Cloud Enabler by Following Our Eight Steps to Hybrid IT
sponsored by NetApp
WHITE PAPER: Access this whitepaper for a list of eight steps designed to teach I&O professionals how to act as internal cloud service brokers and guarantee a successful transition to hybrid IT.
Posted: 20 Nov 2014 | Published: 09 Sep 2014

NetApp

Preventive Practices Help Avoid Costly Security Breaches and Data Risks
sponsored by Insight
WHITE PAPER: This white paper summarizes a number of recent articles on preventive practices that healthcare providers should take in order to avoid falling victim to security breaches that put highly sensitive patient data at risk.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Insight

Cloud Adoption & Risk Report
sponsored by SkyHigh
WHITE PAPER: Download this exclusive whitepaper now to explore the results of a survey that quantifies the gap between perception and reality when it comes to cloud usage and policy and enforcement.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

SkyHigh

Top Cyber Intrusion Mitigation Strategies
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at today's best threat mitigation strategies, and how the addition of next-generation threat intelligence can provide rock-solid security. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Palo Alto Networks

HP ServeIT for IT Infrastructure
sponsored by Hewlett-Packard Company
WHITE PAPER: View this white paper to discover the three preconfigured server solutions available to move your business forward offered by industry giants HP and Microsoft. Cut and slash mundane IT task times to open your days to innovation by choosing the ProLiant Gen 8 server sized right for you.
Posted: 20 Nov 2014 | Published: 29 Oct 2014

Hewlett-Packard Company

PCI DSS Cloud Compliance Requirements
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper serves as a cheat sheet to the ins-and-outs of the payment card industry data security standard.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

SkyHigh
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement