Standards  >  

Electronic Messaging Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Messaging ProtocolsReports
 
Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Bringing System Management to Messaging & Collaboration
sponsored by ComputerWeekly.com
ANALYST REPORT: The fast growing interaction between email, collaboration and social media is creating new management pressures. Analysts Bernt Ostergaard and Clive Longbottom offer answers in this paper from Quocirca.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

ComputerWeekly.com

Presentation Transcript: Microsoft Exchange Server: To Host or Not to Host?
sponsored by Intermedia
PRESENTATION TRANSCRIPT: This webcast presentation transcript reviews the pros and cons of a hosted messaging approach for an Exchange environment. Hosted offerings can help shrink IT budgets, but there are many things to consider for optimal results for your unique company.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Intermedia

Beyond Converged Networks: Driving User Productivity through Unified Communications and Collaboration
sponsored by IBM
WHITE PAPER: Read this whitepaper to understand how to provide users with a single, integrated experience across business applications and communications and collaboration tools.
Posted: 29 May 2008 | Published: 01 Apr 2008

IBM

Extreme Transaction Processing: Electronic trading at NYMEX
sponsored by Progress
WEBCAST: This Webcast explores a method for increasing the capacity of messaging infrastructure in order to support greater message throughput and future organizational growth.
Posted: 28 Sep 2007 | Premiered: Sep 28, 2007

Progress

The Impact of Messaging and Web Threats
sponsored by Trend Micro, Inc.
WHITE PAPER: This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
Posted: 09 May 2008 | Published: 01 Apr 2008

Trend Micro, Inc.

Application Discovery Tool
sponsored by Sophos, Inc.
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos, Inc.

IBM WebSphere MQ File Transfer Edition
sponsored by IBM
WHITE PAPER: This solution brief describes how you can lower business risk and increase productivity with trusted and secured file transfers.
Posted: 07 Jul 2011 | Published: 10 Dec 2010

IBM

From Development to Production: Streamlining SharePoint Deployment with DocAveĀ® Deployment Manager
sponsored by AvePoint, Inc.
WHITE PAPER: This document examines the capabilities of DocAve Deployment Manager and offers tips and guidance to help streamline the SharePoint deployment process while maintaining the integrity of all SharePoint staging instances.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

AvePoint, Inc.

HP Integrity NonStop NB50000c-cg BladeSystem: Availability, Scalability, and Data Integrity for the Telecommunications Environment
sponsored by Hewlett-Packard Company
PRODUCT LITERATURE: The HP Integrity NonStop NB50000c-cg BladeSystem (NB50000c-cg) platform is designed specifically for the telecommunications environment as well as communications, media and entertainment (CME) industries.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement