IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Data Center in a Flash: An All-Flash Converged Infrastructure Starter Guide
sponsored by EMC Converged Platforms
PRODUCT OVERVIEW: Is your organization prepared to meet the evolving expectations of a tech-savvy, mobile workforce? In this brief guide, you will access the features of several all-flash converged infrastructure starter kits, for IT departments looking to increase their flexibility and enhance service delivery.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

EMC Converged Platforms

Colocation Transforms Cloud Service Platform Provider's Business
sponsored by Colt Data Centre Services
CASE STUDY: In this case study, you will discover how e-BO overcame its own complex challenge of delivering high performance, and secure and resilient cloud platforms in the public sector with outsourced data center colocation. Read on to learn the flexibility, scalability, and cost savings colocation may deliver you.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Colt Data Centre Services

ESG Brief: Threat Intel as part of Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: This white paper shows you a new threat intelligence provider that offers a SaaS-based portal and team of intelligence operations analysts that can tailor threat intelligence to your needs.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Digital Shadows

Monitor Performance Success of Citrix Application Virtualization Infrastructures
sponsored by eG Innovations, Inc.
DATA SHEET: In this infographic, you will learn key considerations for deploying Citrix application and desktop virtualization in 2016, and discover how to deliver superior user experience and reduce IT support costs. Read on to enforce auto- baselining for proactive alerting, and more.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

eG Innovations, Inc.

Threat Research: Targeted Attacks on Enterprise Mobile
sponsored by Kingpin Communications
RESEARCH CONTENT: This study reveals whether or not Mobile Remote Access Trojans (mRAT) threats are real for the enterprise. Download now and learn about commercial mRAT threats and what corporate data is at risk.
Posted: 11 Feb 2016 | Published: 25 Mar 2015

Kingpin Communications

Defense-In-Depth: Database Securing
sponsored by Oracle Corporation
WHITE PAPER: Today, a DBA can leave work with terabytes of information easily. In this technical primer, you'll find details on ways to control access for your authorized users. Uncover strategies for data theft, SQL injection, and noncompliance prevention.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Oracle Corporation

End Point Lightboard
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, you will read about the battle security pros fight every day and what new tools they are using to stop hackers.
Posted: 11 Feb 2016 | Published: 31 Aug 2015

Palo Alto Networks

Comparing Security Features of Old and New Operating System Rollouts
sponsored by Microsoft
WHITE PAPER: This quick guide offers a side-by-side comparison of what to expect between legacy and emerging operating systems. Discover details on how important security features have evolved.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

Tips & Tricks for Optimizing Windows Virtual Desktop Deployments
sponsored by eG Innovations, Inc.
WEBCAST: In this webinar, Jeff Stokes, Senior Content Developer at Microsoft, and Bala Vaidhinathan, CTO at eG Innovations, highlight best practices for Windows virtual desktops and VDI image creation. Tune in to get the most value from your virtualized applications and optimize all Windows workloads.
Posted: 08 Feb 2016 | Premiered: Feb 8, 2016

eG Innovations, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement