IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Why Next-Generation Firewalls and Sandboxes Are Not Enough
sponsored by OpenDNS
WEBCAST: In this webcast, learn the steps of the kill chain to better understand how to bolster your existing defenses against emerging and advanced threats.
Posted: 10 Feb 2016 | Premiered: Feb 18, 2015

OpenDNS

The Unexpected Impact of Raising Data Center Temperatures
sponsored by Schneider Electric
WHITE PAPER: In this white paper, you will discover the importance of holistic data center evaluation of IT equipment energy, as illustrated by a capex and energy analysis, as well as see the serious impact of raising temperatures on server failures.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

Schneider Electric

Security Checkup: Diagnose PCI DSS Compliance for Your Hadoop
sponsored by Hortonworks
WHITE PAPER: In this white paper, you will learn how to build PCI compliance into your Hadoop environment. Read this paper to gain all you need to know about Hadoop authentication, perimeter security, customer data protection, and more.
Posted: 12 Feb 2016 | Published: 31 Oct 2015

Hortonworks

Data-Aware Storage: Introducing a New Era of Data Management
sponsored by DataGravity
RESOURCE CENTER: This white paper shows you a new way to store data: data-aware storage. This storage architecture combines state-of-the-art primary storage with integrated data services to create an entirely new method of storage.
Posted: 09 Feb 2016 | Published: 31 Dec 2015

DataGravity

Security Operations in the Cloud
sponsored by TrendMicro
WHITE PAPER: This white paper discusses some best practices to adopt in securing workloads in Amazon Web Services.
Posted: 05 Feb 2016 | Published: 31 Jan 2016


Address Five Hindrances to Delivering More Efficient and Manageable IT
sponsored by Dell, Inc.
WHITE PAPER: Providing a value-adding user experience is the most vital requirement of all IT departments, but what are the five biggest challenges that stand in the CIO's way? In this expert paper, you will examine the top five systems management challenges IT departments face when improving service reliability.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Dell, Inc.

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper discusses how a comprehensive internal and external solution can help to protect your perimeter, your core, your endpoints, and everything else in-between. You'll also learn how automating the interaction between prevention, detection, and mitigation and remediation creates an efficient and effective defense strategy.
Posted: 10 Feb 2016 | Published: 11 Jan 2016

Fortinet, Inc.

Cyber Threat Intelligence Buyers Guide
sponsored by Digital Shadows
WHITE PAPER: This white paper provides an overview of current cyber threat intelligence approaches and types of offerings available. It looks at the rise of digital business in today's world and at the impact that threat intelligence has had on the market.
Posted: 09 Feb 2016 | Published: 27 Jan 2016

Digital Shadows

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: This webcast gives you solutions for business infrastructure virtualization that enable IT organizations to energize businesses of all sizes.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement