IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging SpamReports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Gartner: Become a Cloud Enabler by Following Our Eight Steps to Hybrid IT
sponsored by NetApp
WHITE PAPER: Access this whitepaper for a list of eight steps designed to teach I&O professionals how to act as internal cloud service brokers and guarantee a successful transition to hybrid IT.
Posted: 17 Dec 2014 | Published: 09 Sep 2014

NetApp

Risk-Based Security Buyer's Guide: Addressing Enterprise-class Threats on an SME-class Budget
sponsored by TaaSera
WEBCAST: This exclusive whitepaper will show you how you must shift from a threat-based strategy that focuses on securing the perimeter to a risk-based approach that features a well-conceived incident response plan.
Posted: 08 Dec 2014 | Premiered: Nov 10, 2014

TaaSera

Encrypt Your Virtual and Cloud-Based Data Centers with SafeNet ProtectV
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper introduces a solution that offers persistent, secured storage for structured and unstructured data, wherever it resides.
Posted: 11 Dec 2014 | Published: 15 Aug 2013

SafeNet, Inc.

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Staying Secure in the Cloud: Considerations for Migrating Communications Solutions to Cloud Services
sponsored by ShoreTel
WHITE PAPER: This white paper examines security considerations for migrating communication solutions into the cloud and offers insight into how a cloud service protects your valuable data. Read on to learn more.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

ShoreTel

Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper reports the findings of an extensive SafeNet survey of security professionals around the world, offering insights into current market realities and their implications for security executives.
Posted: 12 Dec 2014 | Published: 11 Nov 2013

SafeNet, Inc.

The Convergence of Security and Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This eBook defines potential compliance and security gaps; identifies what effect these gaps can have on your organization; and reveals how a positive solution can close these gaps to ensure the security of servers and endpoints, and help to ensure compliance with industry regulations.
Posted: 16 Dec 2014 | Published: 31 Jul 2014

Bit9, Inc.

Enriching online and social media interaction with a scalable cloud environment
sponsored by IBM
WHITE PAPER: This case study examines how Wimbledon was able to deploy new cloud software to support a highly agile and scalable cloud environment, rapidly provisioning and deprovisioning servers as needed. Read on to learn how this solution accelerates service deployment by 50% and delivers the agility necessary to respond to massive changes in demand.
Posted: 08 Dec 2014 | Published: 31 Jul 2014

IBM

Protect Your Organization by Thinking Like an Attacker
sponsored by Core Security Technologies
VIDEO: Download this exclusive video now to learn about a solution that helps you think like an attacker while consolidating, prioritizing, and normalizing threats.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement