IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Why DNS Security is Essential
sponsored by Cloudmark
WHITE PAPER: This white paper covers exactly how attackers use DNS to compromise a network.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Cloudmark

Dell PowerEdge FX2 Solution Saved Time, Labor, Space and Money
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: Faster server deployment in half the space means big savings for growing companies. This resource delivers test results on enclosures and servers that are built to save time, labor, and money while leaving plenty of room to grow. Read on to learn how this provides 50% more rack space available and while requiring 62.8% less time to deploy.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Dell, Inc. and IntelĀ®

Mobility on hold: Get back on track with mobile risk mitigation
sponsored by IBM
WHITE PAPER: This white paper introduces one security system that keeps up with the risks of mobile banking.
Posted: 20 Feb 2015 | Published: 31 Dec 2013

IBM

[Security Identity Governance: Reduce Risk and Comply with Regulations
sponsored by IBM
WHITE PAPER: Access this white paper to discover how to effectively manage identities and application access while bringing together business operations and IT. Read on to learn how to bridge the gaps across compliance, and how this can reduce the risk of fraud, human error, and more.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM

Top 5 Web and Mobile App Security Challenges
sponsored by Veracode, Inc.
RESOURCE: Access this brief infographic to learn the top five challenges to securing web and mobile applications today. View now to explore an alternative strategy to reduce app-layer risk.
Posted: 26 Feb 2015 | Published: 27 Jan 2015

Veracode, Inc.

Striking the Right Balance Between App Security and Usability
sponsored by CA Technologies.
WHITE PAPER: Access this informative white paper to discover how to balance mobile security with usability.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

CA Technologies.

Financial Malware Explained
sponsored by IBM
WHITE PAPER: This white paper gets you inside the head of a fraudster and gives you insight into how they work.
Posted: 25 Feb 2015 | Published: 31 Dec 2014

IBM

Best Practices for Virtualizing and Protecting Exchange Server
sponsored by Veeam Software
WHITE PAPER: In this white paper, you'll learn about the considerations that must be taken into account when virtualizing Exchange Server. You'll learn why it's important to avoid using dynamic hardware allocations or overcommitments, and avoid manipulating state data. Read on to learn more.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

Veeam Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement