IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Instant Message Security

RSS Feed   
Instant Message Security Multimedia (View All Report Types)
 
Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Fact or Fiction: The Future of Email Attacks
sponsored by Symantec Hosted Services
PODCAST: In this expert podcast, Tom Bowers, Technical Editor of Information Security magazine, will confirm or debunk a number of common beliefs about what's coming next. This Podcast features a "fact or fiction"-style interview about future email-based attacks.
Posted: 27 Oct 2006 | Premiered: Oct 31, 2006, 09:00 EST (14:00 GMT)

Symantec Hosted Services

Endpoint Security and Control
sponsored by Sophos
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008

Sophos

The Future of Privilege Management - Understanding the Bigger Picture
sponsored by One Identity
VIDEO: In this on-demand webcast, join two IAM experts, Martin Kuppinger and Jackson Shaw, as they talk about the evolution of the Privilege Management market and where the market is moving to.
Posted: 23 Aug 2018 | Premiered: 20 Aug 2018

One Identity

Keeping Users Off the Spear Phishing Hook Webinar
sponsored by MediaPRO
VIDEO: Increasingly, IT security teams are running simulated phishing campaigns internally, to try and reduce their exposure to phishing threats. To learn how your organization can deploy this kind of training, tune into this webinar for simulation best practices, anti-phishing tools, and more.
Posted: 01 Oct 2018 | Premiered: 19 Sep 2018

MediaPRO

InSecurity Podcast: Katie Moussouris Breaks Down Bug Bounty Programs
sponsored by Cylance
PODCAST: Tune into this episode of the InSecurity Podcast, where host Matt Stephenson is joined by Katie Moussouris, CEO of Luta Security, to talk about bugs, bug bounties and their impact on security and privacy.
Posted: 24 Aug 2018 | Premiered: Aug 13, 2018

Cylance

Adopting a Zero Trust Model: Google Did It, Can You?
sponsored by Zscaler
WEBCAST: In this webinar hear from Ameet Jani, Product Manager at Google Cloud and Manoj Apte, Chief Strategy Officer at Zscaler as they talk about zero-trust security, and how to take a user and application-centric approach to application access.
Posted: 09 Oct 2018 | Premiered: Apr 27, 2018

Zscaler

How Centrify Enforces Compliance and Security Best Practices on AWS with Dome9
sponsored by Amazon Web Services
WEBCAST: Download this webinar to learn how you can use the native security controls in AWS and the capabilities of Dome9 Arc to help your business remain secure and compliant on AWS.
Posted: 12 Sep 2018 | Premiered: Sep 12, 2018

Amazon Web Services

Citrix Workspace vs. VMware Workspace ONE
sponsored by Citrix
VIDEO: Tune in to this slideshow, complete with live demonstrations, to learn how Citrix's Workspace platform stacks up against VMware's Workspace ONE in terms of user productivity and experience, ensuring digital perimeters are secure, and providing unified management for on-prem and cloud environments.
Posted: 02 Aug 2018 | Premiered: 18 Jun 2018

Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement