IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Instant Message Security

RSS Feed   
Instant Message Security Multimedia (View All Report Types)
Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Endpoint Security and Control
sponsored by Sophos
TRIAL SOFTWARE: Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008


Enterprise Messaging Security and Management
sponsored by Symantec Corporation
WEBCAST: Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
Posted: 16 Oct 2006 | Premiered: Oct 16, 2006

Symantec Corporation

Fact or Fiction: The Future of Email Attacks
sponsored by Symantec Hosted Services
PODCAST: In this expert podcast, Tom Bowers, Technical Editor of Information Security magazine, will confirm or debunk a number of common beliefs about what's coming next. This Podcast features a "fact or fiction"-style interview about future email-based attacks.
Posted: 27 Oct 2006 | Premiered: Oct 31, 2006, 09:00 EST (14:00 GMT)

Symantec Hosted Services

CEO Insights - Cybersecurity Predictions for 2019
sponsored by Arctic Wolf
VIDEO: Cybercriminals have hacked into many name brand companies like Adidas, Twitter and Ticketmaster. The pace is not expected to slow down. In this webcast, Brian NeSmith walks through cybersecurity predictions and what organizations can do to best prepare for them.
Posted: 06 Dec 2018 | Premiered: 31 Dec 2018

Arctic Wolf

The State of Open Source Vulnerabilities Management
sponsored by WhiteSource
WEBCAST: Open source software has become an indispensible part of the software industry. However, development and security teams are challenged to meet open source security objectives, without compromising on speed and quality. This webcast discusses the key strategy for effective vulnerability management.
Posted: 09 Jan 2019 | Premiered: Nov 15, 2018


Strategies for Improving Enterprise Application Security
sponsored by WhiteSource
WEBCAST: While most enterprises are focused on application scanning and remediation, many software development experts are advocating better, more secure application development initiatives that prevent vulnerabilities from occurring in the first place. In this webcast, experts discuss steps to integrate security into the app development process.
Posted: 15 Jan 2019 | Premiered: Mar 13, 2018


Egnyte as a File Server Replacement
sponsored by Egnyte
VIDEO: Learn about a secure SaaS solution that offers NTFS-like permissions, standard letter drive, centralized reporting and auditing, file versioning, and more.
Posted: 29 Oct 2018 | Premiered: 23 Oct 2018


Hidden Face of the Darknet
sponsored by Radware
VIDEO: Tune in to explore the different attack services and tools that can be purchased inside the dark net.
Posted: 06 Nov 2018 | Premiered: 31 Oct 2018


How Notre Dame Maintains Uptime on AWS: A Master Class
sponsored by Amazon Web Services
VIDEO: Tune into this webinar to hear Aaron Wright, Notre Dame Systems Engineer, discuss how the university maintains continuity when unforeseen circumstances arise.
Posted: 09 Nov 2018 | Premiered: 18 Jun 2018

Amazon Web Services

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement