IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed    Add to Google    Add to My Yahoo!
IM Spam Reports
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Deliver Apps Faster with PaaS Strategies
sponsored by Red Hat
WHITE PAPER: Access this infographic and learn how to give DevOps teams the tools they need to create and deploy apps at the pace of business.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Red Hat

Security in a Dangerous Time: Network Security's Top Fears in 2015
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shares the top 5 security priorities that concerned network security professionals over the last year.
Posted: 17 Nov 2015 | Published: 08 Apr 2015

Fortinet, Inc.

IDC’s Top Ten IT Security Predictions for Asia-Pacific
sponsored by RSA, The Security Division of EMC
VIDEO: Watch this video to uncover the top 10 IT Security predictions from IDC Asia Pacific's head of IT security research, Simon Piff. Tune in as he discusses the potential impact each projection will have on Asia Pacific markets.
Posted: 19 Nov 2015 | Premiered: 16 Nov 2015

RSA, The Security Division of EMC

Camera Streaming Takes the "Hard" Out of Remote Hardware Support
sponsored by Citrix GoToAssit SeeIt
WHITE PAPER: In this white paper, you will learn how to expand your support reach using live camera streaming. Read on to get an exclusive look at 5 mobile streaming use cases and open up opportunities for improved customer service and new lines of business.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

Citrix GoToAssit SeeIt

The Rise of the Anytime-Anywhere Mobile Worker
sponsored by Good Technology
WHITE PAPER: In this white paper, you will learn how to harness the power of your anytime-anywhere workforce by viewing 8 key considerations to evaluate mobile platforms. Discover how to securely mobilize your enterprise, while also considering mobile data protection, app development, and more.
Posted: 23 Nov 2015 | Published: 31 Dec 2014

Good Technology

RockYou Customer Video
sponsored by Rackspace
WEBCAST: In this webcast, learn why RockYou decided to move their infrastructure to the cloud, and the business benefits they saw from doing so, including: increased uptime, quick and easy scalability, less pressure on internal IT, and more.
Posted: 18 Nov 2015 | Premiered: Jun 25, 2015


Smart Log Monitoring and Analysis: The Key to Security Success
sponsored by LogRhythm, Inc.
EGUIDE: This expert guide discusses how you can create a strategic log monitoring and analysis program that won't get in the way of your users' privacy.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

LogRhythm, Inc.

A Report on the Critical Capabilities Required for High-Security Mobility Management
sponsored by Good Technology
ANALYST REPORT: In this exclusive analyst report, you will learn how to achieve increased protection in mobile markets using a hybrid mix of enterprise mobility management (EMM), platform and security vendors. Read on to ensure your EMM vendor will support business processes without disruptions.
Posted: 23 Nov 2015 | Published: 29 Jul 2015

Good Technology

What Are the Motivators Behind Enterprise Tablet Adoption?
sponsored by MXN Corporation
EGUIDE: This exclusive e-guide highlights the eight driving factors behind enterprise tablet adoption. Access this e-guide now to key into the best practices for IT managers dealing with mobile device management, mobile workers, and more.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

MXN Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement