IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

IM Security

RSS Feed   
IM Security Multimedia (View All Report Types)
 
Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Endpoint Security and Control
sponsored by Sophos
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos

NIST Cybersecurity Framework Explained
sponsored by RSA Conference
WEBCAST: Since its release by the NIST in 2014, the Cybersecurity Framework has been the topic of conversation across industry sectors. These comments prompted Framework enhancement and clarification, forging the update v1.1 release in 2018. This webcast focuses on the information presented in the update. Watch now to learn more.
Posted: 30 Jul 2019 | Premiered: Jul 30, 2019

RSA Conference

Live Threat Briefing New Attack Trends in Retail
sponsored by Shape Security
WEBCAST: Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.
Posted: 19 Aug 2019 | Premiered: Aug 19, 2019

Shape Security

Software Composition Analysis: An examination of critical SCA concepts
sponsored by Sonatype
WEBCAST: Based on Sonatype’s data, around 313,000 java components are downloaded each year. Of those downloads, 27,704 are components with known vulnerabilities – that’s 8.8%. With software composition analysis (SCA), security integrates seamlessly with open source innovation. Check out Sonatype’s webinar to find out how.
Posted: 23 Dec 2019 | Premiered: Aug 30, 2019

TOPICS:  Java | Security
Sonatype

Threats of Surveillance Tools: Spyware and Stalkerware
sponsored by RSA Conference
PODCAST: Digital monitoring of workers, children and spouses is more commonplace than ever. But what happens when the line between monitoring and spying becomes blurred? Tune in to this RSAC podcast as two security experts share the work they’ve been doing to help protect victims and their personal data from unwanted surveillance.
Posted: 21 Jan 2020 | Premiered: Dec 16, 2019

RSA Conference

Building Your Kubernetes AppSecStrategy
sponsored by Snyk
WEBCAST: According to Gartner research, by 2023, over 70% of global organizations will be using containers in production services. Kubernetes security, then, is a top priority, especially as third-party components introduce vulnerabilities. Watch this webinar to learn three lessons to improve your organization’s application security strategies.
Posted: 22 Jan 2020 | Premiered: Oct 17, 2019

TOPICS:  Security
Snyk

Securing the Mobile and API Connected Work Space: Evernote Case Study
sponsored by Data Theorem
VIDEO: Evernote is a global software provider of mobile applications for individuals and teams. In this video, learn how Data Theorem helped Evernote identify and close 105 security issues and remove 17 harmful third-party libraries, all before releasing them to the public app stores.
Posted: 18 Sep 2019 | Premiered: 18 Sep 2019

Data Theorem

How to Save Your Failing IT Projects and Deployments
sponsored by Goliath
VIDEO: Tune into this half-hour webinar to learn how proactive monitoring and troubleshooting tools can keep your IT deployments running smoothly – and can prevent IT projects from failing.
Posted: 26 Nov 2019 | Premiered: 29 Oct 2019

Goliath
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info