IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam White Papers (View All Report Types)
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

How to Build a Robust Application Security Governance Framework
sponsored by Veracode, Inc.
WHITE PAPER: Discover not only how to simply, but also streamline application security. Learn how to ensure that everyone is in-sync, and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.
Posted: 15 Dec 2016 | Published: 31 Dec 2015

Absolute

The Power of Linking Business Analysis and TOGAF® to Achieve IT Results
sponsored by Global Knowledge
WHITE PAPER: This white paper addresses the The Open Group's Architecture Framework (TOGAF) framewo­­­rk and a high-level overview of the key business analysis techniques that IT professionals would benefit from to achieve IT results and establish a valued partnership with the business.
Posted: 06 Jan 2017 | Published: 03 Jan 2017

Global Knowledge

Protecting Your Business in the Digital Transformation Journey
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: As digital transformation shifts the risk landscape, IT security must change with it. In this white paper, discover the nature of this shit, as well as the role mobile devices play in modern security networks, how a BI program can help you build a comprehensive security program, successful strategies used by other mid-market companies, and more.
Posted: 17 Jan 2017 | Published: 29 Feb 2016

Hewlett-Packard Enterprise

The Future of Value-added Cloud Services: GPUs as a Service
sponsored by PhoenixNap
WHITE PAPER: Download this resource to discover a cloud infrastructure purpose-built for GPU-intensive application workloads, able to handle media processing, online gaming, transcoding, and more. Learn how to leverage this cloud service with high-performing GPU to fulfill your every app requirement.
Posted: 11 Jan 2017 | Published: 11 Jan 2017


Malware Prevention vs. Detect and Respond
sponsored by Dell, Inc. & Intel®
WHITE PAPER: Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware detection problem and learn why prevention is the best security approach.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell, Inc. & Intel®

Seven Critical Success Factors for Choosing a Reliable Data Center Provider
sponsored by CyrusOne
WHITE PAPER: This resource offers 7 critical success factors for choosing a reliable data center provider, including guidance for finding one that provides financial stability, physical security, SLAs, and more. Download now to delve further and ensure the high availability of your IT footprint.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

CyrusOne

Seeing Through the Clouds: Cloud Visibility Improves Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper explains why network telemetry is the key to better cloud security. Learn how network telemetry can expand advanced visibility, threat detection, and security analytics capabilities to the cloud for more comprehensive network protection.
Posted: 15 Dec 2016 | Published: 30 Sep 2016

Cisco Systems, Inc.

Two-Factor Authentication Helps Officers Protect and Serve New York
sponsored by BlackBerry
WHITE PAPER: Learn how field officers of the Suffolk County Police Department of Long Island, NY utilize two-factor authentication to protect and serve their constituents and keep their database safe.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement