IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Advanced Threat Protection Buyer's Guide
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how to assess your current and proposed security posture against a baseline set of requirements to ensure you are able to choose the right security option for your organization. The 3 overarching recommendations include broad coverage, the proper mix of prevention, detection, and mitigation, and one more.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Fortinet, Inc.

'All-Flash' Based Converged Infrastructure Delivers for High-Performance Mixed Workloads
sponsored by EMC Converged Platforms
PRODUCT OVERVIEW: In this solution brief, you will learn how to accommodate the emergence of mixed, high-performance workloads and third-platform applications with an 'all-flash' based converged infrastructure. Read on to leverage rich-data services like in-line deduplication, storage compression, and automated load balancing to deliver scale-out performance.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

EMC Converged Platforms

Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: This white paper explores cyber situational awareness and presents a three-staged approach to incorporate cyber situational awareness into your defenses.
Posted: 05 Feb 2016 | Published: 31 Jan 2016

Digital Shadows

Threat Research: Targeted Attacks on Enterprise Mobile
sponsored by Kingpin Communications
RESEARCH CONTENT: This study reveals whether or not Mobile Remote Access Trojans (mRAT) threats are real for the enterprise. Download now and learn about commercial mRAT threats and what corporate data is at risk.
Posted: 11 Feb 2016 | Published: 25 Mar 2015

Kingpin Communications

LA Building and Safety Dept. Streamline Application Delivery to Remote Offices
sponsored by Hewlett-Packard Enterprise
CASE STUDY: In this case study, you will discover how LADBS streamlined their remote office support by utilizing a hyper-converged appliance system. Read on to support full app functionality with this converged infrastructure, and ensure business continuity with multisite disaster recovery.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

Hewlett-Packard Enterprise

Choosing a Firewall That's Right for You
sponsored by Palo Alto Networks
VIDEO: This webcast discusses how to retain the advantages of enterprise apps while minimizing risk with better network security. Learn how to choose a firewall that's right for your business's apps and users.
Posted: 09 Feb 2016 | Premiered: 29 Feb 2012

Palo Alto Networks

Checkpoint: Demystifying Mobile Security Attacks
sponsored by Kingpin Communications
WHITE PAPER: In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

How to Raise Your IT Availability with Better Virtualization Protection
sponsored by Veeam Software
VIDEO: This webcast gives you solutions for business infrastructure virtualization that enable IT organizations to energize businesses of all sizes.
Posted: 12 Feb 2016 | Premiered: 30 Sep 2015

Veeam Software

Executive Viewpoint: Getting Tough on Security Threats
sponsored by F5 Networks
WHITE PAPER: In this executive viewpoint, you'll uncover a Q&A with security pro Mark Vondemkamp as he reveals how organizations can ramp up scalability, access control, and context-aware policies in their threat management efforts. Find answers to five pertinent questions.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement