IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam White Papers (View All Report Types)
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

6 Major Trends Shaping the Future of Security
sponsored by Box
WHITE PAPER: This white paper outlines the 6 major trends that are changing IT security as we know it.
Posted: 20 May 2015 | Published: 20 Feb 2014

Box

White Paper: Get Ahead with Cisco Connected Factory
sponsored by Cisco Systems, Inc.
WHITE PAPER: In the years ahead, sensor-embedded, Internet-ready machines will become increasingly commonplace for manufacturing firms. Are you ready? Discover how the Cisco Connected Factory can help you tap the potential of the Internet of Things (IoT) in manufacturing—download the white paper.
Posted: 11 May 2015 | Published: 11 May 2015

Cisco Systems, Inc.

Shellshock and Future Vulnerabilities — Buying Precious Time
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to explore how Shellsock works, how attackers are exploiting network vulnerabilities, and what to do about future vulnerabilities.  View now to learn more.
Posted: 11 May 2015 | Published: 01 Apr 2015

Dell, Inc.

Securing Your Data Center from Endpoints to the Core
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the features and benefits of a security approach that defends the network core and edge to better protect data centers from today's latest risk factors.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

Powering Transformation: The IT Revolution is Now
sponsored by ServiceNow
WHITE PAPER: This white paper reveals why IT is undergoing a revolution, and why it is time to get ahead of the curve and embrace the shift.
Posted: 22 May 2015 | Published: 31 Dec 2013

ServiceNow

DNS Hijacking and Phishing - Easy Exploits
sponsored by Neustar®
WHITE PAPER: This white paper explores several steps you can take you reduce the number of human and technical vulnerabilities to mitigate the risks of phising and DNS hijacking attacks. Continue reading to learn how to better protect your network.
Posted: 20 May 2015 | Published: 06 May 2015

Neustar®

A Buyer's Checklist for Mobile Application Platforms
sponsored by IBM
WHITE PAPER: Some organizations need help identifying key platform capabilities required for mobile. Use this checklist to find out.
Posted: 14 May 2015 | Published: 14 May 2015

TOPICS:  IT Management
IBM

SCB Builds a Defense Against Malware
sponsored by Malwarebytes Corporation
WHITE PAPER: In this case study, learn the story of an architectural firm that dramatically decreased malware attacks while increasing productivity.
Posted: 08 May 2015 | Published: 08 May 2015

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement