IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Instant Message Security

RSS Feed    Add to Google    Add to My Yahoo!
Instant Message SecurityReports
 
Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Messaging Security: Preventing Data Loss and Malware Infection through Electronic Communications
sponsored by Symantec Corporation
WEBCAST: In this webcast, discover the many procedures, tools and policies available to Windows security administrators to secure an enterprise's electronic communications.
Posted: 09 Nov 2006 | Premiered: Nov 29, 2006, 09:00 EST (14:00 GMT)

Symantec Corporation

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Business-Class Security and Compliance for On-Demand Instant Messaging
sponsored by WebEx Communications, Inc.
WHITE PAPER: Instant messaging (IM) can increase productivity, but not without potentially compromising the security and privacy of the information that is being shared. Read this paper to learn how your organization can securely meet its business goals with IM.
Posted: 16 Feb 2007 | Published: 01 Dec 2006

WebEx Communications, Inc.

Outbound Email and Data Loss Prevention in Today’s Enterprise, 2010
sponsored by Proofpoint, Inc.
WHITE PAPER: This report summarizes the findings of Proofpoint’s seventh annual survey of enterprise attitudes about outbound email, content security and data protection. Its goal is to help raise awareness of the policy, technology and cultural issues surrounding email and Web monitoring, data protection and information leaks.
Posted: 08 Sep 2010 | Published: 08 Sep 2010

Proofpoint, Inc.

Connect Users Any Time, Everywhere-with Secure, Affordable Business IM
sponsored by WebEx Communications, Inc.
WHITE PAPER: Instant messaging (IM) improves productivity by enabling employees to communicate information directly from their desktops. Read this paper to learn how to improve collaboration while allowing for security, compliance and centralized administration.
Posted: 16 Feb 2007 | Published: 01 Feb 2007

WebEx Communications, Inc.

Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.

Cisco ASA 5500 Series Business Edition Solution
sponsored by Cisco Systems, Inc.
HARDWARE LISTING: The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, so you can feel confident your business is protected.
Posted: 28 Feb 2008 | Published: 01 Jan 2007

Cisco Systems, Inc.

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Unauthorized Applications: Taking Back Control
sponsored by Sophos, Inc.
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement