IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam White Papers (View All Report Types)
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

IDC Insight Converged Datacente Operational Efficiencies
sponsored by Nutanix
WHITE PAPER: Access this white paper to explore the benefits of integrated infrastructure, including reduced amount of equipment needed in the datacenter, decreased environmental needs, a common management and reporting tool, and more.
Posted: 19 Jan 2015 | Published: 28 Feb 2014

Nutanix

Advanced Threat Hunting with Carbon Black
sponsored by Bit9 + Carbon Black
WHITE PAPER: Download this exclusive white paper now to learn how you can improve your security posture by setting the foundational elements necessary to proactively hunt for and eliminate threats.
Posted: 16 Jan 2015 | Published: 09 Jan 2014

Bit9 + Carbon Black

Complete Breakdown of the Endpoint Security Marketplace
sponsored by Webroot
WHITE PAPER: This exclusive white paper looks at the evolution of the endpoint security marketplace as it fights to limit threats that attack antivirus weaknesses, circumvent security protection, and compromise endpoint systems.
Posted: 29 Jan 2015 | Published: 16 Dec 2014

Webroot

Engage Audit Professionals for Better Security Assessment Outcomes
sponsored by IBM
WHITE PAPER: This white paper explains how to leverage your internal audit team's resources and expertise to develop a more efficient, sustainable compliance program
Posted: 22 Jan 2015 | Published: 26 Jun 2013

IBM

Allgress Vulnerabilty Analysis Module
sponsored by Allgress
WHITE PAPER: Check out this important white paper now to learn about a vulnerability management program that can automate your entire workflow.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

Allgress

Your Guide to Achieving IT Service Excellence
sponsored by LabTech Software
WHITE PAPER: This extensive white paper dives into how you can meet and exceed customer expectations to ensure customer retention as a managed service provider.
Posted: 30 Jan 2015 | Published: 15 Dec 2014

LabTech Software

Webroot Secure Anywhere ® Business Endpoint Protection
sponsored by Webroot
WHITE PAPER: This exclusive white paper dives into the changes you must make to your endpoint security to move on from a slow, heavy approach that ultimately causes more problems than it solves.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Webroot

The Definitive Guide to Managed File Transfer
sponsored by Ipswitch File Transfer
WHITE PAPER: View this resource to gain a better understanding of what managed file transfer (MFT) is all about, including its importance in our high tech world that we live in today.
Posted: 15 Jan 2015 | Published: 31 Dec 2014

Ipswitch File Transfer

Printing Security: The ‘Forgotten Link’ in Operational Excellence
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper covers the top 10 rules for effective printer security.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement