IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

How Cyber Attackers Operate and How to Stop them
sponsored by IBM
VIDEO: In this video, discover what separates today's attacks from those of the past and how you can revamp your security to meet modern threats.
Posted: 20 May 2015 | Premiered: 22 Apr 2014

IBM

VMware NSX The Platform for Network Virtualization
sponsored by VMware
WHITE PAPER: Current network and security solutions are rigid, complex and often vendor-specific. Consult this white paper to find out more on how VMware NSX can bring your data center and networking strategies to the next level.
Posted: 22 May 2015 | Published: 22 May 2015

VMware

Hosted Exchange 2013 Buyer’s Guide
sponsored by Rackspace
RESOURCE: Access this email hosting buyer's guide for a thorough 4-step explanation to finding a better Exchange.
Posted: 14 May 2015 | Published: 01 Dec 2014

Rackspace

Overcome the Challenges Associated With New Technologies
sponsored by Peer1
VIDEO: This video highlights several challenges IT decision makers face when adopting new technologies.
Posted: 20 May 2015 | Premiered: 20 May 2015

Peer1

Examining the Hacker's Evolution
sponsored by White Hat Security
WEBCAST: This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected and the top 10 attacks they use. Inside, learn how a risk based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch. View now to learn more.
Posted: 21 May 2015 | Premiered: May 6, 2015

White Hat Security

Windows Server 2012: Security in the Enterprise
sponsored by Dell and Microsoft
WHITE PAPER: In the following technology brief, learn about the various security challenges brought about by cloud and virtual desktop practices. Access now and learn how to handle these security deficiencies, including how to leverage Windows Server 2012 to help aid in the process.
Posted: 18 May 2015 | Published: 18 May 2015

Dell and Microsoft

Securing Next-Generation Mobile Security
sponsored by EE
WHITE PAPER: This white paper explores enterprise mobility management (EMM) strategies and how to secure mobile users.
Posted: 21 May 2015 | Published: 08 Apr 2015

EE

Uncover Advanced Attacks and Detect Hidden Breaches
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, discover how you can gain greater visibility into the state of both active and live threats hidden within your network.
Posted: 22 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

The Case for Hosted Exchange
sponsored by Rackspace
WHITE PAPER: This white paper reveals the benefits of managing Microsoft Exchange in the cloud and lays out the detailed costs of managing a hosted versus an on-premises Exchange environment.
Posted: 14 May 2015 | Published: 01 May 2013

Rackspace
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement