IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

IT Best Practices for Managing (or Inheriting!) Public Cloud Workloads
sponsored by Embotics
WEBCAST: Many workloads don't need to be running 24/7, but it's easy to forget to power them down which can give you a nasty surprise that is your monthly bill. Automation can help you reduce public cloud spending by 65% by scheduling on/off times for non-production instances. In this webcast, learn how other organizations are overcoming these pains.
Posted: 23 Aug 2016 | Premiered: May 18, 2016

Embotics

Arresting Data Sprawl with HCI
sponsored by Pivot3
WEBCAST: Watch this webcast to hear from an early adopter of hyperconverged infrastructure as he describes his environment and offers advice to peers considering the deployment of HCI.
Posted: 29 Aug 2016 | Premiered: Aug 22, 2016

Pivot3

Applied Behavior Analytics: Don't Be an Outlier!
sponsored by Distil Networks
WHITE PAPER: In this 451 report excerpt, explore the implications of applied behavior analytics on today's security landscape. Learn about the technical features of this technology that make it stand out, as well as recommendations on how to proceed.
Posted: 30 Aug 2016 | Published: 30 Jun 2016

Distil Networks

Quantifying the Riskand Economic Impactof Bad Bots
sponsored by Distil Networks
WHITE PAPER: Learn how to mitigate the threat of bad bots to your enterprise's sites. Discover vital information on issues faced by sites due to bad bots, such as web scraping, security breaches, spam, skewed analytics, and more.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Distil Networks

Ovum Report: Why Put Mobile Threat Protection On Your Radar?
sponsored by Lookout
WHITE PAPER: This report details Ovum's view on the "urgent need for protection systems" to secure enterprise mobile devices and the value that one mobile threat security system provides. Access now to learn about this system and its essential mobile security features, like MDM integration, jailbreak/root detection and more.
Posted: 31 Aug 2016 | Published: 22 Mar 2016

Lookout

Actionable Global Threat Intelligence – the Key to a Proactive Cybersecurity Strategy
sponsored by Dimension Data
RESOURCE: This resource introduces the need for an intelligence lead security model that emphasizes addressing end-point security as a key weakness. Inside you will find access to a current report on threat intelligence.
Posted: 30 Aug 2016 | Published: 07 Jun 2016

Dimension Data

Simplifying PCI DSS Compliance
sponsored by Unisys
WHITE PAPER: Through their research, the security experts at ControlScan have found that organizations are more successful with PCI compliance when they address PCI scope reduction early in the IT management cycle. Access this white paper that provides ControlScan's assessment of one software-based security solution that can reduce PCI DSS scope.
Posted: 30 Aug 2016 | Published: 30 Jun 2016

Unisys

Maximize Online Archiving Security
sponsored by LogicNow
WHITE PAPER: Discover how using email archival is vital to enterprises looking to secure their records and leave nothing to chance. Learn how a cloud-based service can remove many of the costs, concerns and complexities associated with on-premises email solutions, including the setup, management and monitoring of email servers.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

LogicNow

Compliance Glossary of the Cloud
sponsored by VMware
WHITE PAPER: Discover a comprehensive glossary of compliance standards for the cloud. Learn what your enterprise needs to remain compliant in the following fields: Audit/Assurance, Management, Finance, and more.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

VMware
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement