IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Instant Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Secure Instant Messaging Reports
 
The Impact of New Communications in the Energy Industry
sponsored by Actiance
WHITE PAPER: This white paper discusses the use of instant messaging technology in the energy industry, explaining why monitoring, logging, and archiving these communications is a necessity for achieving compliance and protecting critical assets from cyberattacks.
Posted: 16 Feb 2015 | Published: 30 May 2014

Actiance

Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Instant Messaging Tough Enough for Business: No Server Required
sponsored by WebEx Communications, Inc.
WHITE PAPER: This white paper discusses the important benefits that business Instant Messaging (IM) can provide and the security factors that must be addressed as organizations plan their upgrade to an enterprise-grade IM capability.
Posted: 16 Feb 2007 | Published: 01 Sep 2006

WebEx Communications, Inc.

Outbound Email and Data Loss Prevention in Today’s Enterprise, 2010
sponsored by Proofpoint, Inc.
WHITE PAPER: This report summarizes the findings of Proofpoint’s seventh annual survey of enterprise attitudes about outbound email, content security and data protection. Its goal is to help raise awareness of the policy, technology and cultural issues surrounding email and Web monitoring, data protection and information leaks.
Posted: 08 Sep 2010 | Published: 08 Sep 2010

Proofpoint, Inc.

Endpoint Security and Control
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos, Inc.

Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Connect Users Any Time, Everywhere-with Secure, Affordable Business IM
sponsored by WebEx Communications, Inc.
WHITE PAPER: Instant messaging (IM) improves productivity by enabling employees to communicate information directly from their desktops. Read this paper to learn how to improve collaboration while allowing for security, compliance and centralized administration.
Posted: 16 Feb 2007 | Published: 01 Feb 2007

WebEx Communications, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement