IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging SpamReports
 
Messaging Security: Understanding the Threat of eMail and IM Attacks
sponsored by Symantec Corporation
PODCAST: Mike Cobb, Founder and Managing Director of Cobweb Applications Ltd., investigates the severity of phishing and IM virus threats, and spends time assessing the effectiveness and requirements of unified messaging security products.
Posted: 10 Nov 2006 | Premiered: Nov 14, 2006, 09:00 EST (14:00 GMT)

Symantec Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Create a More Agile Data Center with Data Center Infrastructure Management
sponsored by nlyte Software
WHITE PAPER: This exclusive whitepaper looks at the value of data center infrastructure management in making a more agile data center.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

nlyte Software

Dell Mobility Solutions: A powerful portfolio
sponsored by Dell Software
WHITE PAPER: When choosing a bring your own device (BYOD) business solution, make sure it's flexible, covers security and covers all the devices in your business. In this new business brief, see how Dell offers end-to-end BYOD mobility solutions that meet your company's needs today, and down the road.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Dell Software

Infographic  - What does the next-generation data centre look like
sponsored by IBM
WHITE PAPER: Explore this resource to get a look at what a next-generation data centre will look like, with features ranging from software defined computing, to automated provisioning and management, to innovative and optimised services. Read on now to find out more.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

IBM

Strict Procedures and Tools to Keep The Private Cloud Secure
sponsored by Dell and Microsoft
EGUIDE: In this expert e-guide, learn how to ensure private cloud security with careful planning as well as tools available to help secure the cloud environment.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Dell and Microsoft

Enable Secure Access to Apps
sponsored by Fiberlink
DATA SHEET: The BYOD era has left IT with less control over the network, creating security and network integrity problems.  IT professionals are constantly striving to secure sensitive enterprise data and discover vulnerabilities.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Fiberlink

Staying Secure and Compliant during Windows XP End-of-Life
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this white paper, discover the a new security solution that can enable you to continue using Windows XP to the fullest while keeping your systems compliant and secure.
Posted: 27 Aug 2014 | Published: 31 Dec 2013

Bit9 + Carbon Black

Top Five Alternatives to Endpoint Antivirus Software
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this in-depth Forrester report, discover the top 5 technologies that security professionals are using to replace outdated antivirus software.
Posted: 26 Aug 2014 | Published: 09 Jun 2014

Bit9 + Carbon Black

Holistic Risk Management: Professional Perspectives
sponsored by IBM
WHITE PAPER: In this informative white paper, gain critical insights into the top strategies for strengthening enterprise-wide risk management and business resilience frameworks.
Posted: 27 Aug 2014 | Published: 31 Dec 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement