IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed    Add to Google    Add to My Yahoo!
Instant Messaging SpamReports
 
Messaging Security: Understanding the Threat of eMail and IM Attacks
sponsored by Symantec Corporation
PODCAST: Mike Cobb, Founder and Managing Director of Cobweb Applications Ltd., investigates the severity of phishing and IM virus threats, and spends time assessing the effectiveness and requirements of unified messaging security products.
Posted: 10 Nov 2006 | Premiered: Nov 14, 2006, 09:00 EST (14:00 GMT)

Symantec Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Next generation firewall product analysis
sponsored by Fortinet, Inc.
WHITE PAPER: This resource contains a product analysis of a next generation firewall (NGFW) that discusses security, performance, TCO and several other categories that are not available anywhere else.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Fortinet, Inc.

Security Concerns in the C-Suite and How Next-Generation Firewalls Can Help
sponsored by Fortinet, Inc.
WHITE PAPER: This resource highlights the danger behind APTs, leading to the need for heightened network security with the help of next-generation firewalls.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Show Me Simpana - Access
sponsored by CommVault Systems, Inc.
VIDEO: This exclusive video examines a single platform that provides instant, secure anytime anywhere access to your data.
Posted: 10 Sep 2014 | Premiered: 25 Feb 2013

CommVault Systems, Inc.

Bluewave Computing Realizes Million-Dollar Productivity Gains with N-Able Technologies
sponsored by N-able Technologies
WHITE PAPER: Access this case study to learn how one organization was able to upgrade their service automation platform and deliver benefits in terms of improved productivity, efficiency, and customer retention.
Posted: 16 Sep 2014 | Published: 16 Sep 2014

N-able Technologies

Identity and access management (IAM) in the cloud Challenges galore
sponsored by IBM
EGUIDE: This expert e-guide points out challenges surrounding IAM in the cloud that Indian businesses are now dealing with.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

IBM

SAP uses HP Fortify to help produce Secure Applications
sponsored by Hewlett-Packard Company
CASE STUDY: In this case study, examine how SAP embarks on a journey to perform static analysis on application code in order to identify and mitigate vulnerabilities early on.
Posted: 10 Sep 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

Needle in a Datastack: The Rise of Big Security Data
sponsored by Intel Security
WHITE PAPER: Big data holds many answers, but only if an organization has the capability to harness the ever growing amounts of security information. In deploying a SIEM solution to analyze this data, organizations can repel advanced threats in real-time as well as spot the stealthy, dormant threat.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Intel Security

Manage Identities & Access for Continuous Compliance & Reduced Risk
sponsored by IBM
WHITE PAPER: This white paper highlights the importance of IAM strategies complying with regulations to ensure strong security.
Posted: 11 Sep 2014 | Published: 01 Apr 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement