IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Leveraging UC Platform for Improved Media Quality
sponsored by NetScout Systems, Inc.
WHITE PAPER: In this white paper, learn how a unified communications platform can provide a holistic view of user experience for all converged IP-based services to help maintain user satisfaction. Read on to see the problems this tool can solve, and its benefits, including quick triaging of issues, improving IT team collaboration, and more.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

NetScout Systems, Inc.

5 Ways to Enable Strong Cloud Security
sponsored by Oracle Corporation
EGUIDE: In this exclusive e-guide, our experts explore 5 quick tips to minimize cloud security risks. Plus, learn why distributed denial-of-service (DDoS) attacks are on the rise, explore strategies for next-gen security architecture, and more.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Oracle Corporation

Smart Log Monitoring and Analysis: The Key to Security Success
sponsored by LogRhythm, Inc.
EGUIDE: This expert guide discusses how you can create a strategic log monitoring and analysis program that won't get in the way of your users' privacy.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

LogRhythm, Inc.

Security, Performance, and Availability Monitoring Solutions for Today's Data Center
sponsored by AccelOps Inc.
WHITE PAPER: Access this white paper to discover the challenges MSPs face and how they can gain full visibility and control of their customers' entire infrastructure – servers, storage, virtualized server and storage, networks, security devices, applications and users – all from a single pane of glass.
Posted: 19 Nov 2015 | Published: 15 Mar 2013

AccelOps Inc.

How to Measure Your IT Department for Better Service Delivery
sponsored by Global Knowledge
WHITE PAPER: From resource availability to necessary improvements, measurements are the key to successfully understanding how your organization is performing. This paper will give you guidance on why measuring is important, how to get started, what types of metrics are available, what should be measured, and how to go about initiating improvements.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Global Knowledge

Camera Streaming Takes the "Hard" Out of Remote Hardware Support
sponsored by Citrix GoToAssit SeeIt
WHITE PAPER: In this white paper, you will learn how to expand your support reach using live camera streaming. Read on to get an exclusive look at 5 mobile streaming use cases and open up opportunities for improved customer service and new lines of business.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

Citrix GoToAssit SeeIt

Simplify migration to Hyper-V and Microsoft System Center
sponsored by Vision Solutions
WHITE PAPER: Access this white paper to find out how you can make the migration to Hyper-V and Microsoft Systems Center easy and affordable by reducing downtime and complexity.
Posted: 16 Nov 2015 | Published: 31 Dec 2014

Vision Solutions

Computer Weekly – 24 November 2015: Technology helping to deliver aid for refugees
sponsored by
EZINE: In this week's Computer Weekly, we find out how technology is helping to deliver vital aid to Syrian refugees in the Middle East. We look at the barriers to achieving the government's aim of a paperless NHS. And the CTO of special effects studio Framestore talks about the IT challenges behind hit movies such as Gravity. Read the issue now.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Cybersecurity Experts Brittle Security Systems Need Overhaul
sponsored by Unisys
EGUIDE: In this expert e-guide, learn why your security strategy will continue to fail if you do not prioritize the continuous implementation and upgrading of sophisticated security controls and the ongoing education of users and CXOs.
Posted: 19 Nov 2015 | Published: 04 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement