IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM SpamReports
 
Messaging Security: Understanding the Threat of eMail and IM Attacks
sponsored by Symantec Corporation
PODCAST: Mike Cobb, Founder and Managing Director of Cobweb Applications Ltd., investigates the severity of phishing and IM virus threats, and spends time assessing the effectiveness and requirements of unified messaging security products.
Posted: 10 Nov 2006 | Premiered: Nov 14, 2006, 09:00 EST (14:00 GMT)

Symantec Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Pragmatic Approach to Data Center Management – Control and Manageability
sponsored by Avocent
WHITE PAPER: This white paper explores a pragmatic view of data center management and examines the best practices in real-world data centers for over-arching management solutions. Read on to learn how you can control costs and manage complex technology environments while achieving core objectives for availability and security.
Posted: 24 Nov 2014 | Published: 30 Sep 2010

Avocent

Top Cyber Intrusion Mitigation Strategies
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at today's best threat mitigation strategies, and how the addition of next-generation threat intelligence can provide rock-solid security. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

Palo Alto Networks

Are You Prepared to Tackle The Challenges Surrounding Application Visibility?
sponsored by Citrix
WHITE PAPER: In this white paper, discover a solution that can help your organization enhance application visibility.
Posted: 19 Nov 2014 | Published: 01 Mar 2013

Citrix

Major Digital Entertainment Business Protects Hundreds of Artist Websites with CloudPassage Halo
sponsored by CloudPassage
CASE STUDY: In this case study, learn how a major digital entertainment business protects hundreds of artist websites with software-defined security delivered in a SaaS model with cost-effective, metered-based pricing.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

CloudPassage

Modern Infrastructure: Democratizing Disaster Recovery
sponsored by CDW Corporation
WHITE PAPER: Access this expert to learn how cloud computing capacity and scalability are making disaster recovery capabilities more availability for organizations across all industries. You'll also get insight into how you can reduce the costs of colocation, leverage big data to take on IT management, and explore the growing role of tablets in the enterprise.
Posted: 24 Nov 2014 | Published: 31 Mar 2014

CDW Corporation

Time is protected
sponsored by AppSense
WEBCAST: View this webcast to explore a privilege management solution that allows for employee access to any application they need to enhance productivity.
Posted: 20 Nov 2014 | Premiered: Nov 20, 2014

AppSense

NSS Labs Comparative Analysis - Security Value Map
sponsored by Citrix
WHITE PAPER: Access this white paper to get a clear cut view of various web application firewalls, and learn how they stack up against one another.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Citrix

The Economic Impact of AdvancedPersistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the financial impact of advanced persistent threats by detailing the results of a study of 755 IT and IT security practitioners.
Posted: 20 Nov 2014 | Published: 13 May 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement