IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Evaluating Red Hat Virtualization
sponsored by Red Hat
SOFTWARE DEMO: Is your enterprise ready to securely and confidently virtualize mission-critical applications, while gaining unparalleled performance and scalability? Take advantage of this free trial of Red Hat Virtualization now to evaluate its compatibility with your organization.
Posted: 24 Jan 2017 | Premiered: 24 Jan 2017

Red Hat

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

State of Software Security: A Developer's Viewpoint
sponsored by Veracode, Inc.
WHITE PAPER: Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

NASA: Increasing Cloud Efficiency with Ansible Tower
sponsored by Red Hat
CASE STUDY: Download this case study to examine how NASA leveraged cloud-based, scalable IT automation to simplify configuration management and scheduling of their complex cloud environment. Learn how NASA better equipped itself to manage its AWS and achieved near real-time RAM and disk monitoring.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Red Hat

2017 IT Priorities APAC - Survey Results
sponsored by ComputerWeekly.com
EGUIDE: Every year, Computer Weekly asks CIOs and senior IT decision-makers about the technologies and initiatives they will be investing in over the next 12 months. Here you can read the results from over 1000 responses in APAC and see how your 2017 plans compare.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

ComputerWeekly.com

How Digital Transformation Drives New Revenue Opportunities
sponsored by Presidio Networked Solutions
WHITE PAPER: Digital transformation asks, How can I use technology to drive better business outcomes? Download now to learn from forward-thinking CIOs how to lay the foundation for a successful digital transformation and drive new revenue opportunities in your enterprise.
Posted: 19 Jan 2017 | Published: 14 Nov 2016

Presidio Networked Solutions

Computer Weekly – 17 January 2017: RAC digitises roadside assistance
sponsored by ComputerWeekly.com
EZINE: In this week's issue, we find out how roadside assistance company RAC acquired a software company and deployed cloud-based telemetry to deliver internet-connected car technology for older vehicles. We also investigate the IT security risks associated with IoT and look at best practices in rolling out workplace collaboration.
Posted: 16 Jan 2017 | Published: 16 Jan 2017

ComputerWeekly.com

IoT Trends & Challenges in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we put a South-East Asian spin on the global phenomenon that is the Internet of Things (IoT). With billions of internet connected devices expected around the world, enterprises and governments simply can't ignore IoT, its benefits and its risks.
Posted: 22 Jan 2017 | Published: 22 Jan 2017

ComputerWeekly.com

Managing Risks and Mitigating Threats in Today's IT Environment
sponsored by TechData - HPE
WHITE PAPER: In this white paper, learn about a complete security platform that takes a risk-based, adversary-centric approach to threat protection to ensure your IT environment remains protected.
Posted: 17 Jan 2017 | Published: 31 Mar 2016

TechData - HPE
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement