IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Seamless Data Pump
sponsored by Avnet
WHITE PAPER: This white paper explores a way to reduce the complexity of the service delivery process and standardize the on boarding process. You'll learn how this is possible through rapidly discovering the customer's hardware and software assets and provide detailed information of the assets such as manufacturer, OS, version, model, serial number, etc.
Posted: 26 Feb 2015 | Published: 04 Feb 2015

Avnet

Taking Control of the Digital and Mobile User Authentication Challenge
sponsored by RSA
WHITE PAPER: In this white paper, view the strategies and policies available to managing user authorization and access to reduce risk and protect yourself from cyber-attacks. Read on to see how others have taken advantage of these strategies in several case studies.
Posted: 27 Feb 2015 | Published: 07 Jan 2015

RSA

Case Study: Healthcare Company Goes 100% Cloud
sponsored by Dimension Data
VIDEO: In this brief video, learn how an integrated healthcare company completely migrated to a hybrid cloud environment for a more flexible, dynamic, efficient data center.
Posted: 03 Mar 2015 | Premiered: 17 Dec 2014

Dimension Data

Best practices for systems and asset management
sponsored by Crayon Group
EGUIDE: This e-guide explores the biggest systems management challenges, offers tips on the skill sets a system management admin should have, and helps guide your organization down the best path for IT asset management.
Posted: 03 Mar 2015 | Published: 03 Mar 2015

Crayon Group

Test Results for 5 Security Systems
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This report summarizes tests conducted on five different security programs, revealing which ones caught the most threats, had the best usability, and more.
Posted: 02 Mar 2015 | Published: 18 Nov 2014

Check Point Software Technologies Ltd.

Extracting the Full Business Value from Cloud Services
sponsored by NaviSite
WHITE PAPER: This white paper proposes that the key to achieving the most value from cloud investments includes considering the impact that they will have throughout the entire organization, and explores real-world customer experiences that examine the true business impact of the cloud.
Posted: 03 Mar 2015 | Published: 30 Sep 2014

NaviSite

Safeguarding Compliance and Remaining Vigilant
sponsored by IBM
VIDEO: Tune into this brief video to learn how to safeguard enterprise compliance and automate processes to reduce costs and manage risk.
Posted: 26 Feb 2015 | Premiered: 07 Jan 2015

IBM

Instill Better Collaboration Practices Into Your Business
sponsored by XO Communications
WHITE PAPER: View this white paper to learn why deploying a hosted PBX service is more advantageous than sticking with your traditional, premier-based PBX.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

XO Communications

SIEM Battleground Unfolds Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at next-generation security information and event management (SIEM), analytic tools and cloud-based systems designed to help CISOs make sense of security data.
Posted: 05 Mar 2015 | Premieres: 16 Mar 2015

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement