IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Top 10 IoT Technologies for 2017 and 2018
sponsored by Gartner
WHITE PAPER: This feature analysis from Gartner, discusses 10 technologies that will be vital for organizations to unlock the full potential of the IoT as part of their digital business strategies in the future. Download now to access information on – when these technologies will become relevant, who will be impacted and some of the cautions to be mindful of.
Posted: 14 Jul 2016 | Published: 22 Jan 2016

Gartner

Analyst Report: 8 Building Blocks to Ensure Successful Digital Transformations
sponsored by Gartner
WHITE PAPER: Discover the 8 essential building blocks of successful digital workplace initiatives in this Gartner report. Find recommendations for everything IT leaders need to enact digital change – from strategic planning to digital workplace technologies to consider.
Posted: 18 Jul 2016 | Published: 27 Feb 2015

Gartner

Managing Encrypted Traffic
sponsored by Blue Coat Systems
WHITE PAPER: Discover how you can utilize encrypted traffic management while granting complete visibility and control of SSL communications and the potential threats therein without requiring re-architecting the security infrastructure, nor impacting network performance.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Blue Coat Systems

Achieve Data Center Stability and Reliability with Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Discover how to achieve total systems stability and reliability within your data center—without sacrificing advanced capabilities—with Red Hat Enterprise Linux. Tune into this video to invest in IT budget-friendly, open-source data center automation, leaving your admins to focus on value-added projects for your business.
Posted: 14 Jul 2016 | Premiered: 02 Jul 2014

Red Hat

Improve Communication with Stakeholders
sponsored by ReadyTalk
WHITE PAPER: Learn how you can use unified communications to streamline the adoption of new technology in your enterprise. You'll see how communications can be used to make life easier for the IT team, and how they can use these tools to get buy-in from stakeholders in new IT rollouts.
Posted: 19 Jul 2016 | Published: 19 Jul 2016

ReadyTalk

Going global: Get up and running quickly no matter where you need to go
sponsored by Infor
WHITE PAPER: Discover how making sure that key capabilities are built into your technology can make your financial management system and processes an asset to global expansion. From finding and retaining the right talent to managing complex tax structures, your choices should enable you to easily handle the complexities of expanding your business globally.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

Infor

Revamping Employee Performance Management for Bimodal IT
sponsored by Gartner
WHITE PAPER: This Gartner report addresses the lag in IT performance management processes, which is making evaluating bimodal IT organizations difficult. Discover the key challenges and recommendations for adopting effective performance measures for IT teams.
Posted: 21 Jul 2016 | Published: 10 Jun 2016

Gartner

Five-Step Guide to Implementing Encrypted Traffic Management (ETM)
sponsored by Blue Coat Systems
RESOURCE: Discover a step-by-step guide on how to implement encrypted traffic management. Learn how to assess your network security tools, collaborate with multiple departments to ensure privacy compliance, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

Blue Coat Systems

Defending the Indefensible: Preparing for an Uncertain Digital Future
sponsored by LogRhythm, Inc.
WHITE PAPER: The following discussion explores fundamental challenges in enforcing cybersecurity measures, the financial burden of prevailing security approaches, and suggested solutions to overcome vulnerabilities in existing infrastructures. Access now to learn what CSOs are saying about the state of corporate cybersecurity.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement