IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

IM Security

RSS Feed    Add to Google    Add to My Yahoo!
IM SecurityReports
 
Messaging Security: Understanding the Threat of eMail and IM Attacks
sponsored by Symantec Corporation
PODCAST: Mike Cobb, Founder and Managing Director of Cobweb Applications Ltd., investigates the severity of phishing and IM virus threats, and spends time assessing the effectiveness and requirements of unified messaging security products.
Posted: 10 Nov 2006 | Premiered: Nov 14, 2006, 09:00 EST (14:00 GMT)

Symantec Corporation

Top Tactics to Beat Ever-Changing Email Threats
sponsored by Symantec Hosted Services
WEBCAST: In this expert webcast, Tom Bowers of Information Security magazine offers insight on the latest messaging-borne threats and investigates the movement from pure antivirus suites to more complete antimalware offerings.
Posted: 27 Oct 2006 | Premiered: Oct 31, 2006, 09:00 EST (14:00 GMT)

Symantec Hosted Services

Fact or Fiction: The Future of Email Attacks
sponsored by Symantec Hosted Services
PODCAST: In this expert podcast, Tom Bowers, Technical Editor of Information Security magazine, will confirm or debunk a number of common beliefs about what's coming next. This Podcast features a "fact or fiction"-style interview about future email-based attacks.
Posted: 27 Oct 2006 | Premiered: Oct 31, 2006, 09:00 EST (14:00 GMT)

Symantec Hosted Services

Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Microsoft® Lync® Server 2010 on DellTM Systems
sponsored by Dell and Microsoft
WHITE PAPER: This critical resource provides configurations that can be used to architect Lync 2010 infrastructures ranging from 500 to 25,000 users so that you organization's communications are efficient and effective.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell and Microsoft

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Unauthorized Applications: Taking Back Control
sponsored by Sophos, Inc.
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007

Sophos, Inc.

Instant Messaging Tough Enough for Business: No Server Required
sponsored by WebEx Communications, Inc.
WHITE PAPER: This white paper discusses the important benefits that business Instant Messaging (IM) can provide and the security factors that must be addressed as organizations plan their upgrade to an enterprise-grade IM capability.
Posted: 16 Feb 2007 | Published: 01 Sep 2006

WebEx Communications, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement