IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

IT Advancements: Quantifying the Business Value of Nutanix Solutions
sponsored by Nutanix
WHITE PAPER: In this white paper, you will learn why organizations running workloads on hyperconverged infrastructure benefit from strong application performance. Read on here to implement advanced infrastructure solutions in your business.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Nutanix

Email Continuity: Safeguard Email Communications 24/7
sponsored by ControlEmail
WHITE PAPER: This white paper explores email outages and how hosted email continuity can mitigate threats and downtime.
Posted: 27 Aug 2015 | Published: 04 Dec 2014

ControlEmail

Accelerating Business Transformation Through IT Innovation
sponsored by Dimension Data
WHITE PAPER: This report uses survey results and IT leaders' insights to discuss what's keeping businesses from embracing IT innovation, and what can be done to get around these barriers.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Dimension Data

How to Startup with Hybrid Cloud: 5 Steps to Get Started
sponsored by VMware
WHITE PAPER: This white paper serves as a startup guide, and outlines the top 5 most common ways you can get started when thinking about adopting hybrid cloud. Read on here to find out how you can extend your existing applications and data center, as well as expand critical infrastructure for disaster recovery into the cloud.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

VMware

Modernize your Enterprise with Effective Analytics Strategies
sponsored by TIBCO Software Inc.
WHITE PAPER: This brief white paper invites you to explore innovative business models and use cases made possible by analytics and data management.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

TIBCO Software Inc.

Partnering Up to Meet Your Clients' Security Needs
sponsored by Webroot
WHITE PAPER: This white paper discusses the opportunity that today's cybersecurity challenges present to solution providers and explains why finding the right security partner is essential for capitalizing on it.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Webroot

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: To secure Amazon Web Services, users need to do their part by being smart about IAM permissions and AWS security groups.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS

Endpoint Security is Changing – How Will You Keep Up?
sponsored by Webroot
WEBCAST: This research report uses statistics gathered from security professionals to examine the state of endpoint security today and where it is going in the future.
Posted: 31 Aug 2015 | Premiered: Dec 31, 2014

Webroot

Hybrid Cloud Security Is No Castle in the Air
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at hybrid cloud security and five strategies that CIOs have used to secure these environments.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

TOPICS:  Security
SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement