IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Increase Employee Productivity with Cloud-Based IT Service Automation
sponsored by ServiceNow
WHITE PAPER: This white paper examines the challenges associated with replacing an inefficient ITSM platform, and outlines the benefits of switching to cloud-based IT service automation. Access this case study to learn how you can deploy a singular ITSM platform.
Posted: 27 Aug 2015 | Published: 30 Apr 2014

ServiceNow

Holistic Protection against Today's Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses how implementing a holistic threat protection technology can help you protect more of your network while spending less.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

How to Gain Management Approval and Employee Buy-in for UC
sponsored by ThinkingPhones
WHITE PAPER: This white paper serves as a guide for IT professionals in businesses looking to adopt unified communications platforms in their organizations. Learn how to gain both management approval and employee buy-in for UC solutions.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

ThinkingPhones

Hybrid Cloud Security Is No Castle in the Air
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at hybrid cloud security and five strategies that CIOs have used to secure these environments.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

TOPICS:  Security
SearchSecurity.com

Don’t Build a House of Cards The 5 Pillars of Project Portfolio Management
sponsored by Innotas
WHITE PAPER: This white paper discusses the five critical pillars of project portfolio management and how you should think about each of aspect.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Innotas

Cybersecurity and Data Protection: What Every Board of Directors Should Know
sponsored by Raytheon|Websense
WHITE PAPER: This document presents a non-technical overview of cybersecurity and provides recommendations for board members wishing to keep their organization safe.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Raytheon|Websense

Inside Look: ROI Summary for Cloud-Based ITSM
sponsored by ServiceNow
RESOURCE: In this quick infographic, discover the ROI summary for a cloud-based ITSM platform. You'll gain insight into the average annual benefits per customer.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

ServiceNow

Eight Essential Elements for Effective Threat Intelligence Management
sponsored by BrightPoint Security
WHITE PAPER: This white paper contains eight techniques you can adopt to keep up with the ever-shifting threat intelligence landscape.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

BrightPoint Security

Adopt New Enterprise UC Technologies with Speed, Agility, and Security
sponsored by Red Hat
WHITE PAPER: This white paper will introduce you to several third-party collaboration technologies that will help you innovate ahead of business demands. Access this white paper to learn how to select the proper collaboration technologies for you that can foster interoperability in your organization.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement