IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM SpamReports
 
Messaging Security: Understanding the Threat of eMail and IM Attacks
sponsored by Symantec Corporation
PODCAST: Mike Cobb, Founder and Managing Director of Cobweb Applications Ltd., investigates the severity of phishing and IM virus threats, and spends time assessing the effectiveness and requirements of unified messaging security products.
Posted: 10 Nov 2006 | Premiered: Nov 14, 2006, 09:00 EST (14:00 GMT)

Symantec Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Rapidly Respond to Advanced Attacks in Motion with Carbon Black
sponsored by Bit9 + Carbon Black
EBOOK: Access this in-depth resource that explains why your organization would be better off by establishing a security lifecycle – one that reduces the area to attack while also detecting advanced threats in real time. Read on to learn more about evolving enemies, understanding the kill chain, and more.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Bit9 + Carbon Black

Securing Your Company - Where Do You Start?
sponsored by NEC Corporation of America
PRESENTATION TRANSCRIPT: In this helpful resource, hear from the experts as they examine the best practices and strategies for effectively protecting your enterprise data safe from attackers without compromising any other aspects of the business.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

NEC Corporation of America

Research Report: Mobile Security Trends in the Workplace
sponsored by Bluebox
WHITE PAPER: In this informative report, get the facts on enterprise mobility trends and BYOD programs, and discover how organizations should adapt to this changing IT security landscape.
Posted: 15 Aug 2014 | Published: 30 Jun 2014

Bluebox

MFT Center of Excellence Whitepaper
sponsored by IBM
WHITE PAPER: Many companies have implemented managed file transfer (MFT) as a way to gain control over a wide array of file transfer activities.  By employing these products, companies have remediated the inherent risk of File Transfer Protocol (FTP).
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

5 Key Considerations in Delivering Enterprise Class Cloud Services
sponsored by Egenera
WEBCAST: Watch this informative webcast to find out five key considerations for organizations considering cloud service providers.
Posted: 13 Aug 2014 | Premiered: Feb 27, 2013

Egenera

Move from Chaos to Control:  Creating a Mature File Transfer Process
sponsored by IBM
WHITE PAPER: When it comes to moving files between people, business, and other processes a majority of organizations are struggling. This webcast will show you how to defeat your file transfer demons.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Top Six Steps to Boost Advanced Persistent Threat Security
sponsored by IBM
WHITE PAPER: In this expert E-guide, discover the six steps your organization can take to mitigate the threat of APTs, including building a growing security team, cross functional integration, centralized logs, and more.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Separating Work and Personal - How BlackBerry Balance Works at the Platform Level
sponsored by BlackBerry
WHITE PAPER: This exclusive paper examines a tool that separates work data from personal data on mobile devices so that you can provide the best security without sacrificing the user experience.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement