IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Project Management is Twisted and Tangled and Broken
sponsored by Workfront
EGUIDE: Read this resource to learn how you can overcome 3 common problems facing IT project managers.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

Workfront

An Enterprise Architect’s Guide to Big Data
sponsored by Oracle Corporation
WHITE PAPER: This white paper will serve as your guide to the big data ecosystem and the choices that an enterprise architect will likely face in this new environment. Read on to learn how through an enterprise architecture approach, decisions can be made to ensure business alignment, a value-centric roadmap, and ongoing governance.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

Oracle Corporation

The Dynamic IT Landscape of 2015
sponsored by Curvature
EGUIDE: Read this guide to learn how to integrate the newest enterprise IT concepts that will lower costs when adopting a new strategy.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

Curvature

Monitor Application Performance in the Hybrid Cloud With Full Visibility
sponsored by New Relic
WHITE PAPER: This white paper highlights how to achieve end-to-end visibility into application performance, regardless of where your application or parts of your application are running.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

New Relic

Best Practices for Intelligent Security and File-Sharing
sponsored by Ipswitch File Transfer
EGUIDE: Take a look at this expert guide to discover how to enhance your data protection with stronger threat intelligence and more secure file sharing.
Posted: 20 Apr 2015 | Published: 10 Apr 2015

Ipswitch File Transfer

New Relic for Amazon Web Services
sponsored by New Relic
PRODUCT OVERVIEW: Read this two-solution paper to learn all of the ways that New Relic will improve your AWS experience.
Posted: 22 Apr 2015 | Published: 31 Dec 2014

New Relic

When Agile and Waterfall Collide: A Project Manager's Guide to Combining 2 Disparate Methodologies
sponsored by Workfront
WHITE PAPER: Today's project managers are faced with a challenge: While most of their work follows a traditional Waterfall methodology, they're increasingly being asked to collaborate with Agile software development teams. This white paper dives into the differences between the two methodologies and provides a roadmap for combining them.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

Workfront

Device and Data Protection - Part 1
sponsored by Dell, Inc. and Intel®
WEBCAST: Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

Big Data and Enterprise Data: Bridging Two Worlds with Oracle Data Integrator 12c (ODI12c)
sponsored by Oracle Corporation
WHITE PAPER: Access this white paper to find out how to correlate Big Data with your existing enterprise data so you can take full advantage of Big Data benefits.
Posted: 23 Apr 2015 | Published: 31 Jan 2015

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement