IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Case Study: Meeting Compliance with Secure Document Capture and Printing
sponsored by Nuance
WHITE PAPER: Read this case study to discover how the VHA implemented secure document and print management solutions for improved security, compliance, and quality of care.
Posted: 27 Jul 2015 | Published: 31 Dec 2014

Nuance

Enterprise Mobility Strategies: Steps to Success
sponsored by Data#3
WEBCAST: With the expansion of your mobile enterprise, it is ever-important to have mobility management solutions that support flexible work practices and enhance user experience. This webcast provides a framework for developing and implementing a successful enterprise mobility strategy.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015

Data#3

Best practices to enable clinician mobility for patient centered healthcare
sponsored by Citrix
WHITE PAPER: This white paper offers tips for healthcare organizations seeking the benefits of a more mobile environment. Read on to learn strategies, solutions, and real-world examples for transforming healthcare IT without sacrificing security or compliance.
Posted: 31 Jul 2015 | Published: 30 Apr 2013

Citrix

Test Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This free demo allows you to test out a security platform that promises to help you better monitor, analyze and report on malicious behavior in your network.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015

AlienVault

Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

IBM

From MIT’s Center for Digital Business: Communicating IT’s Impact as a Business Enabler:
sponsored by Mendix
WHITE PAPER: In the following Q&A white paper, Dr. George Westerman, author of the best-selling book, The Real Business of IT, answers some interesting questions regarding the true value of IT to the business.
Posted: 23 Jul 2015 | Published: 23 Jul 2015

Mendix

9 Steps to a Secure Printer
sponsored by Nuance
WHITE PAPER: This white paper discusses just how much danger your printer poses to your organization and gives you nine tips for mitigating that danger.
Posted: 21 Jul 2015 | Published: 31 May 2015

Nuance

Make Your Security Proactive, Not Reactive
sponsored by CrowdStrike
WHITE PAPER: This report explains how indicators of attack – suspicious behaviors that can alert organizations to a potential hacks – can be instrumental in preventing sophisticated, targeted attacks.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Business-Critical Documents: Printing You Can Count On
sponsored by Nuance
WHITE PAPER: Improving your cost-effective printing is crucial. Whether printing from a desktop, mobile device or back office system, you can ensure critical and confidential documents are printed at the right place and time.
Posted: 28 Jul 2015 | Published: 27 Sep 2014

Nuance
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement