IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

10 tips to implement Operations Management into VMware vSphere
sponsored by VMware
WHITE PAPER: This informative resource highlights 10 tips – from installation to best practices – to help ensure a successful implementation of a management tool in your vSphere environment.
Posted: 30 Mar 2015 | Published: 31 Dec 2013

VMware

How Can Application Virtualization Help Out Your Mobility Strategy?
sponsored by Citrix
WHITE PAPER: This white paper introduces a leading application virtualization solution that can deliver service to users anywhere on any device.
Posted: 26 Mar 2015 | Published: 30 Nov 2014

Citrix

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline and enhance your risk management strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

Orchestration For Modern IT: Helping IT Accelerate Business
sponsored by ServiceNow
WHITE PAPER: View this white paper to learn how orchestration can help manage the cloud and accelerate your business.
Posted: 27 Mar 2015 | Published: 01 May 2013

ServiceNow

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Coding: The Core Weakness of Web App Design
sponsored by Symantec Corporation
EGUIDE: View this expert e-guide to explore an in-depth look at improving coding to prevent web app attacks such as cross site scripting (XSS) and SQL injection (SQLi). Read on now to learn more about protecting your web apps and data.
Posted: 27 Mar 2015 | Published: 07 Jan 2015

Symantec Corporation

Securing Applications for a Safer Cloud Environment
sponsored by IBM
WHITE PAPER: View this white paper to learn the five steps to combating application breaches in the cloud. Additionally, explore other protocols to reduce risk.
Posted: 25 Mar 2015 | Published: 09 Jul 2014

IBM

Your Guide to: Tackling the Top 3 IT Service Management Challenges
sponsored by ServiceNow
WHITE PAPER: There are three main areas that can quickly become headaches in an IT organization: request management, asset tracking, and reporting. Read this white paper to learn how to reach IT service prominence in these areas by rethinking your approach to all of them.
Posted: 30 Mar 2015 | Published: 30 Mar 2015

ServiceNow

License Management Using Unified Asset and Service Management
sponsored by Global Knowledge
WHITE PAPER: Unified asset and service management software provides a common control center for managing business processes for both digital and physical assets. Discover how to choose the delivery model you need such as on-premise, software as a service (SaaS), or VM image and seamlessly change it to suit your business needs.
Posted: 29 Mar 2015 | Published: 31 Dec 2014

Global Knowledge
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement