IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam White Papers (View All Report Types)
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Case Study: Oxford University Hospitals Cuts Waste with Single Sign-On
sponsored by Imprivata
WHITE PAPER: Access this case study to discover how Oxford University Hospitals sped up the process of secure EPR access, cutting out waste and freeing up more time for patient care.
Posted: 25 Sep 2015 | Published: 31 Dec 2014


Advanced Threat Protection Against Targeted Attacks
sponsored by Trend Micro
WHITE PAPER: Discover how to detect, analyze, and respond to today's stelathy, targeted attacks in this handy white paper.
Posted: 30 Sep 2015 | Published: 07 Aug 2015

Trend Micro

The State of DNS Security
sponsored by Efficientip
WHITE PAPER: This white paper discusses why traditional security solutions leave your DNS vulnerable and gives suggestions for keeping your DNS secure.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Proactive Security Testing: Make Your Products Bullet-Proof
sponsored by Beyondsoft
WHITE PAPER: In this white paper, learn how truly secure products and infrastructure require testing and measurement, and how to you can implement vulnerability protection that is sustainable and cost-effective for bullet-proof security.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Breach Detection Systems Comparative Report
sponsored by Trend Micro
WHITE PAPER: This white paper presents the results of a comparative security test between the top breach detection systems to aid you when crafting your network security strategy.
Posted: 28 Sep 2015 | Published: 02 Sep 2015

Trend Micro

Best Practices for Data Protection and Business Continuity: A Guide for Small and Midsized Organizations
sponsored by Hewlett-Packard Company
WHITE PAPER: This report discusses the specific security challenges that face SMBs and gives advice for how they can keep their data secure with the resources they have.
Posted: 30 Sep 2015 | Published: 30 Jun 2015

Hewlett-Packard Company

Support and Secure Mobile Devices with Enterprise Cloud Management
sponsored by VMware
WHITE PAPER: This white paper highlights a cloud service designed to help organizations leverage O365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise.
Posted: 18 Sep 2015 | Published: 31 Jan 2014


IT's Confidence in Threat Defenses May Be Misplaced
sponsored by McAfee, Inc.
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

McAfee, Inc.

8 Must-Have Features for Your Enterprise Unified Communications
sponsored by Avaya
WHITE PAPER: This white paper highlights 8 key features to consider when evaluating your enterprise communications options. View now to discover why virtualization and resiliency are so critical for today's enterprise-grade UC solutions.
Posted: 22 Sep 2015 | Published: 22 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement