IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed   
IM Spam Multimedia (View All Report Types)
The General Data Protection Regulation (GDPR) is Here
sponsored by BackOffice Associates
WEBCAST: In this webcast hear from Enza Iannopollo, Security & Risk analyst at Forrester Research, as she demonstrates how to get started on building a risk management policy that will best suit the needs of your company.
Posted: 16 Mar 2018 | Premiered: Mar 16, 2018

BackOffice Associates

Real- World Examples: ROI- Results
sponsored by HealthEdge
VIDEO: Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.
Posted: 09 Nov 2017 | Premiered: 02 Nov 2017


Software Asset Management Overview
sponsored by ServiceNow
VIDEO: Watch this brief video to find out how you can reduce software spending, identify assets that are out of compliance, retire software you no longer need, and more with software asset management.
Posted: 23 Jan 2018 | Premiered: 23 Jan 2018


Stop Attacks in Real-Time with Threat Intelligence
sponsored by Cisco Umbrella
VIDEO: Take a closer look into how threat intelligence can take massive amounts of information and make sense of it all. See how you can use this strategy to respond to threats in real-time before they become attacks.
Posted: 14 Aug 2017 | Premiered: 07 Mar 2017

Cisco Umbrella

Cyber Threats: Is Your Team Up to the Challenge?
sponsored by Juniper Networks
WEBCAST: In this webcast, gain valuable insight into how to adapt your IT security teams to overcome the evolving cybersecurity landscape.
Posted: 19 Feb 2018 | Premiered: Aug 31, 2017

Juniper Networks

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID Global
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Your Business Apps are Under Attack: Are you really Protected?
sponsored by Alert Logic
VIDEO: Only 24% of organizations have mature application security in place, according to the 2017 Cybersecurity Trends Report. Take a look at this webcast to reveal statistics regarding app security and what you can do to protect yourself from cyberattacks.
Posted: 22 Sep 2017 | Premiered: 21 Sep 2017

Alert Logic

Avoid Gridlock With a Flexible Infrastructure
sponsored by IBM
VIDEO: Ensure your data center runs smoothly and supports the growth of your business with a software-defined storage solution.
Posted: 06 Apr 2017 | Premiered: 06 Apr 2017

TOPICS:  IT Management

Automating Your Corporate Mobility Management
sponsored by Cisco Jasper
WEBCAST: In this webcast, discover how the mobile workforce is impacting corporate mobility management needs, and costs, and how enterprises are addressing this challenge with an automated mobility management platform.
Posted: 28 Jun 2017 | Premiered: Jun 22, 2017

Cisco Jasper

Magic Quadrant for Data Center Backup and Recovery Software
sponsored by IBM
WEBCAST: Discover the strengths and cautions for the vendors in the Data Center Backup and Recovery Software Magic Quadrant.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement