IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Enterprise Instant Messaging Security

RSS Feed   
Enterprise Instant Messaging Security White Papers (View All Report Types)
 
Microsoft® Lync® Server 2010 on DellTM Systems
sponsored by Dell EMC and Microsoft
WHITE PAPER: This critical resource provides configurations that can be used to architect Lync 2010 infrastructures ranging from 500 to 25,000 users so that you organization's communications are efficient and effective.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell EMC and Microsoft

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

[ 2019 ] State of the Internet / Media Under Assault
sponsored by Akamai Technologies
WHITE PAPER: In this State of the Internet / Security report, take a look at the sources, techniques, and trends in this growing threat. You’ll see what 98% of web attacks against media and technology sectors have in common. And why video media attracts more credential stuffing attacks than any other vertical.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

Akamai Technologies

Get Started with Application Security in 3 Easy Steps
sponsored by Micro Focus
WHITE PAPER: It’s a common misconception that application security strategies are inherently disruptive to productivity. As organization rely more on apps for communication, security becomes paramount. The following guide provides 3 easy steps to help you get started with application security, read on to get started.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

Micro Focus

The Titus Standard: How Metadata Will Accelerate Your Data Protection Strategy
sponsored by TITUS
WHITE PAPER: While the actual contents of files are crucially important to businesses, the metadata that contains information about these files is equally essential. In fact, the intelligent business can use that metadata to establish better security measures. Read on to learn how companies can classify and protect files using metadata information.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

TITUS

Leveraging AI to Modernize Vulnerability Management and Remediation
sponsored by Delve
WHITE PAPER: Advances in AI provide organizations with the ability to automate workloads and offer intelligent decision-making capabilities, easing the burden on IT and security teams and allowing them to focus on strategic imperatives. Download this white paper to learn more about embracing AI to modernize vulnerability management and remediation.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Delve

The Ultimate Guide to Building an Insider Threat Program
sponsored by Proofpoint
WHITE PAPER: 60-70% of security incidents are a direct result of insider behavior – intentional or unintentional. As a result, organizations are quickly developing ways to address the insider threat problem. This white paper The Ultimate Guide to Building an Insider Threat Program, highlights the necessary steps and considerations you need to get started.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

Proofpoint

Top Threats to Cloud Computing: The Egregious 11
sponsored by ExtraHop
WHITE PAPER: Because cloud environments continue to be a lucrative target for cyberattacks, organizations need to be aware of the potential threats they face and how to defend against them. Download this Top Threats report from the Cloud Security Alliance (CSA) for a look at 11 of the most significant threats, risks and vulnerabilities to keep an eye on.
Posted: 18 Jun 2020 | Published: 18 Jun 2020

ExtraHop
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info