IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Instant Message Security

RSS Feed    Add to Google    Add to My Yahoo!
Instant Message SecurityReports
 
Messaging Security: Understanding the Threat of eMail and IM Attacks
sponsored by Symantec Corporation
PODCAST: Mike Cobb, Founder and Managing Director of Cobweb Applications Ltd., investigates the severity of phishing and IM virus threats, and spends time assessing the effectiveness and requirements of unified messaging security products.
Posted: 10 Nov 2006 | Premiered: Nov 14, 2006, 09:00 EST (14:00 GMT)

Symantec Corporation

Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Cisco ASA 5500 Series Business Edition Solution
sponsored by Cisco Systems, Inc.
HARDWARE LISTING: The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, so you can feel confident your business is protected.
Posted: 28 Feb 2008 | Published: 01 Jan 2007

Cisco Systems, Inc.

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Outbound Email and Content Security in Today's Enterprise
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover surprising statistics about how large companies manage the risks associated with outbound email. Read this report which summarizes the key findings from a survey of technology decision makers conducted by Proofpoint and Forrester Consulting.
Posted: 27 Jul 2007 | Published: 01 Jul 2008

Proofpoint, Inc.

Microsoft® Lync® Server 2010 on DellTM Systems
sponsored by Dell and Microsoft
WHITE PAPER: This critical resource provides configurations that can be used to architect Lync 2010 infrastructures ranging from 500 to 25,000 users so that you organization's communications are efficient and effective.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell and Microsoft

Connect Users Any Time, Everywhere-with Secure, Affordable Business IM
sponsored by WebEx Communications, Inc.
WHITE PAPER: Instant messaging (IM) improves productivity by enabling employees to communicate information directly from their desktops. Read this paper to learn how to improve collaboration while allowing for security, compliance and centralized administration.
Posted: 16 Feb 2007 | Published: 01 Feb 2007

WebEx Communications, Inc.

Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.

Business-Class Security and Compliance for On-Demand Instant Messaging
sponsored by WebEx Communications, Inc.
WHITE PAPER: Instant messaging (IM) can increase productivity, but not without potentially compromising the security and privacy of the information that is being shared. Read this paper to learn how your organization can securely meet its business goals with IM.
Posted: 16 Feb 2007 | Published: 01 Dec 2006

WebEx Communications, Inc.

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement