IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM SpamReports
 
Messaging Security: Understanding the Threat of eMail and IM Attacks
sponsored by Symantec Corporation
PODCAST: Mike Cobb, Founder and Managing Director of Cobweb Applications Ltd., investigates the severity of phishing and IM virus threats, and spends time assessing the effectiveness and requirements of unified messaging security products.
Posted: 10 Nov 2006 | Premiered: Nov 14, 2006, 09:00 EST (14:00 GMT)

Symantec Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

IT Service Management Integration - CIO Survey
sponsored by FrontRange Solutions Inc.
WHITE PAPER: In this white paper, discover survey results that capture information on the current state of ITSM integration.
Posted: 24 Jul 2014 | Published: 30 Jun 2012

FrontRange Solutions Inc.

Application data security risks on Android devices
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that personal and sensitive application data stored on smartphones is not as secure as people think and looks at controls that can reduce the risk.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

ComputerWeekly.com

Key Considerations for Colocation Services
sponsored by Equinix
EGUIDE: Explore this expert e-guide to learn about the pros and cons of data center colocation, and review considerations such as power costs, redundancy, availability, and services levels to help you decide if outsourcing data is a wise move for you and your organization.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

Equinix

Webcast: Practical Threat Management and Incident Response for Small and Medium-Sized Enterprises
sponsored by AlienVault
WEBCAST: This helpful webcast discusses a multitude of critical issues related to threat management in small and medium-sized enterprises.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Threat Intelligence: The Key to a Complete Vulnerability Management Strategy
sponsored by AlienVault
WEBCAST: This webcast provides insight into rethinking vulnerability management. It also reviews the common challenges of vulnerability management and ways to overcome those challenges.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

AlienVault

Making the Shift to a Hybrid Solution
sponsored by FrontRange Solutions Inc.
VIDEO: Investigate how FrontRange Solutions became the leading provider of hybrid ITSM solutions and integrated client solutions around the world.
Posted: 23 Jul 2014 | Premiered: 30 Jan 2014

FrontRange Solutions Inc.

Next-Generation Security: Intrusion Prevention Systems
sponsored by CDW Corporation
WHITE PAPER: This white paper describes how an intrusion prevention system (IPS) works and why it's more effective than traditional firewalls in analyzing your network activity to detect and prevent problems.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

VMware SDDC: IT Architecture for the Cloud Era
sponsored by Symantec
VIDEO: This white paper explores the benefits of building a software-defined data center to handle the challenges and demands of the modern data center.
Posted: 24 Jul 2014 | Premiered: 17 Dec 2013

Symantec
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement