IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

HOW TO SOLVE DATA RESIDENCY, PRIVACY, AND SECURITY ISSUES IN THE CLOUD
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to satisfy not only cloud regulations by establishing data residency, addressing privacy issues, and keeping it secure, but also the need to control and manage your cloud presence.
Posted: 23 Feb 2017 | Published: 22 Feb 2017

TOPICS:  Security
Symantec & Blue Coat Systems

Experts Debate National Cybersecurity Policy Suggestions At RSAC 2017
sponsored by Absolute
EGUIDE: What exactly are President Trump's potential policies around encryption and international data flow and how might we all be affected? Download and find out the facts direct from the show floor.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

Absolute

Linux on POWER: Beyond Industry Standards and Performance
sponsored by IBM
WEBCAST: Tune into this webcast to learn how you can bring open innovation to your Linux environment with a processor designed for big data, and which supports the open source Linux environment with a mature ecosystem. Take advantage of this open source infrastructure to quickly integrate innovative technology solutions, and more.
Posted: 24 Feb 2017 | Premiered: Feb 24, 2017

IBM

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
RESOURCE: Discover 11 steps your IT needs to take when adopting cloud apps and services to ensure the safety of your organization.
Posted: 21 Feb 2017 | Published: 20 Feb 2017

Symantec & Blue Coat Systems

A Look at How Data Privacy Laws Impact Cloud Adoption in Russia
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to satisfy Russian data residency, privacy, and regulation requirements when it comes to the cloud. Discover how to avoid business disruptions by complying with the law.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Powering Digital Transformation Through the Cloud-Ready Enterprise
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Digital transformation strategies are being revised to account for the cloud's recently proven viability. Access this IDC report looks at the near-future of cloud enablement and how it is going to impact digital transformation strategies.
Posted: 23 Feb 2017 | Published: 30 Sep 2016

Riverbed Technology, Inc.

Managing the Risks of Cryptocurrency
sponsored by BAE Systems
WHITE PAPER: This report explores how to defend against malware designed to attack cryptocurrencies in an increasingly virtual, mobile, and connected world. Read on to learn about the growing cryptocurrency landscape, how to navigate the cyber risks of virtual currencies, essential tips for protecting your financial institution, and more.
Posted: 28 Feb 2017 | Published: 31 Dec 2016

BAE Systems

3 Steps to Improving Incident Response
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn why 68% of companies want incident response tools that can detect and fully assess threats that infiltrate from an array of devices and geographies.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Symantec & Blue Coat Systems

Advanced Threat Protection: Putting a Solid Sandbox Strategy in Place
sponsored by Dell SonicWALL
WHITE PAPER: Learn how to create a sandbox strategy that maximizes traffic visibility (including encrypted traffic), uses multiple detection methods (leveraging sandboxing, along with passive signature based and heuristic scanning), and possesses an architecture that balances performance, implementation costs and an inability to be detected.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

Dell SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement