IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Modernizing IT Starts with Hyper-Converged
sponsored by Dell EMC and IntelĀ®
WHITE PAPER: Go inside and learn how Dell EMC's VxRail Hyper-converged Appliance could be the right technology on which to base your virtual IT environment. Hear what real-world users had to say about this appliance's manageability, performance, reliability, and more.
Posted: 08 Nov 2017 | Published: 08 Nov 2017

Dell EMC and IntelĀ®

Bots Mean Business
sponsored by F5 Networks
WHITE PAPER: As bot technology, machine learning, and AI continue to evolve, so will the cyber threats they pose. This paper explores how bot innovation enables cybercrime and how you can optimize business intelligence while protecting your enterprise.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

The GDPR Compliance Checklist
sponsored by Citrix
RESOURCE: The General Data Protection Regulation (GDPR) will be effective on May 25, 2018. Download this checklist to see what your organisation needs to do to stay ahead of the GDPR.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Citrix

Payer's Place in the Healthcare Ecosystem Keys to Success
sponsored by HealthEdge
VIDEO: Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value.
Posted: 10 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

4 Steps to Kick-Start Your Security Program
sponsored by LogMeIn Rescue
RESOURCE: Your customers trust you to protect their data, so it is crucial to retain that trust by making security a top priority. Learn how you can protect customers and provide a better overall experience.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

LogMeIn Rescue

Real- World Examples: ROI- Results
sponsored by HealthEdge
VIDEO: Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.
Posted: 09 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

Monitoring Serverless Architectures in AWS
sponsored by AWS-Cisco
WHITE PAPER: The introduction of serverless architectures is helping reduce exposure to threats by breaking services into single-purpose functions with well-defined inputs and outputs. This white paper discusses methods of auditing and monitoring of Amazon Web Services Lambda functions and how to put these methods into practice.
Posted: 03 Nov 2017 | Published: 03 Nov 2017

AWS-Cisco

IoT Privacy and Security
sponsored by TechTarget
RESOURCE: Learn more about IoT attacks that could be threatening your enterprise by taking our Endpoint Security Survey and downloading our expert guide: IoT Privacy and Security. As a bonus for participating, claim a DevSecOps resource upon completion.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

TOPICS:  Security
TechTarget

Datacentre Management
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we've pulled together some of the latest thinking on good datacentre management practice, while shining a light on the tools and technologies that are on the market (or in the pipeline) that can help enterprises run their facilities with greater ease and agility.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement