IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Is Your Data Secure?
sponsored by Commvault
INFORMATION CENTER: Bring Your Own Device (BYOD) in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud and through a multitude of devices. This infographic provides 9 BYOD security facts that can help you further develop and refine your BYOD strategy.
Posted: 18 Oct 2016 | Published: 29 Jul 2016


Protecting and Empowering your Connected Organization
sponsored by Microsoft
WHITE PAPER: This white paper explores how Microsoft Enterprise Mobility + Security helps protect your data in a cloud-first world. Learn how EMS can help you restrict and monitor user identities, receive security updates with an easy-to-read attack timeline, enable users to update passwords via a single portal, and more.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


When Your IAM Policy Encounters the Internet of Things
sponsored by Unisys
EGUIDE: Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
Posted: 17 Oct 2016 | Published: 12 Oct 2016


DDoS Attacks Are On The Rise – And Fatal to Most Businesses
sponsored by Arbor Networks
EGUIDE: This e-guide arms you with the information you need to prepare your defenses for distributed denial of service (DDoS) attacks. Learn how DDoS attacks target your security weak spots, how responses to attacks are improving, and the central challenges surrounding attack prevention.
Posted: 13 Oct 2016 | Published: 11 Oct 2016

Arbor Networks

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016


Threat Analytics Module: Gain Visibility Into Malicious User Activity
sponsored by LogRhythm, Inc.
PRODUCT OVERVIEW: User accounts have long been one of the most prevalent attack vectors for advanced attacks and data breaches. This product overview highlights a threat analytics module that can secure your organization with immediate visibility into suspicious or malicious user activity indicative of an attack.
Posted: 12 Oct 2016 | Published: 31 Aug 2015

LogRhythm, Inc.

Give and Take: A Strategic Approach to Shadow IT
sponsored by Azuqua
WHITE PAPER: This paper explores how a self-service integration platform would allow IT teams to satisfy user demands for integration and bring shadow IT users back under a controlled environment. Find out how you can mitigate risks while allowing shadow IT to play an important role in driving innovation.
Posted: 12 Oct 2016 | Published: 12 Oct 2016


Mobile Data Report 2016
sponsored by Wandera
ANALYST REPORT: Find an analysis of mobile data security and usage trends along with traffic patterns across a global network of enterprise mobile devices. Find significant new mobile threats and compare security and data usage between Samsung Galaxy and Apple devices, as well as between roaming and domestic data usage.
Posted: 20 Oct 2016 | Published: 30 Apr 2016


6 Steps to Software-defined Data Center Adoption
sponsored by Logicalis
WHITE PAPER: What steps should you take to realize the software-defined data center model? Find out six steps for your software-defined data center adoption and how you can enable automation today.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement