IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

IM Security

RSS Feed   
IM Security White Papers (View All Report Types)
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Microsoft® Lync® Server 2010 on DellTM Systems
sponsored by Dell EMC and Microsoft
WHITE PAPER: This critical resource provides configurations that can be used to architect Lync 2010 infrastructures ranging from 500 to 25,000 users so that you organization's communications are efficient and effective.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell EMC and Microsoft

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

A Risk-Adaptive Approach to Dynamic Data Protection
sponsored by Forcepoint
WHITE PAPER: By using Dynamic Data Protection, organizations can automate policy enforcement to dynamically respond to changes in risk within an organization. Read on to learn more about the end-to-end, human-centric security architecture.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

Forcepoint

Securing Your Modern Network with AWS and Cisco Stealthwatch Cloud
sponsored by Amazon Web Services
WHITE PAPER: The security of the network, which was always important to the network admin, has become a top priority. However, you can’t fix what you can’t see. In this white paper learn how Stealthwatch Cloud can help you to see your network activity, identify the signs of potential threats, and more.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

Amazon Web Services

Harnessing Containers for the Big Data Era
sponsored by Aporeto
WHITE PAPER: With the rise of DevOps, Kubernetes has become extremely popular and with good reason, but securing Kubernetes can be challenging. In this white paper, uncover 3 best practices for securing workloads deployed in a Kubernetes cluster.
Posted: 14 Oct 2019 | Published: 31 Jul 2019

Aporeto

Upgrading Your ERP?
sponsored by Avalara
WHITE PAPER: Upgrading an ERP platform and integrating it with a modern tax automation solution becomes more urgent as the definition of nexus expands beyond physical presence. This white paper will address the urgency of tax automation, the limitations of legacy and on-premise solutions, and the advantages of cloud-based platforms.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Avalara

Avoid Getting More Than You Bargained for in M&A Deals
sponsored by Avalara
WHITE PAPER: Sales tax is a common challenge during mergers and acquisitions, but rarely gets addressed early on. However, syncing sales tax management early in the process can save you from serious compliance headaches later. In this white paper, learn how to include sales tax compliance in your integration strategy.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

Avalara

Network Security for a New Era
sponsored by TechData - HPE
WHITE PAPER: Mobile devices and smart objects are connecting to the same school networks, but they have very different security needs. Read this report for how K-12 leaders can manage the new security challenges of mobile devices and smart objects.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

TechData - HPE
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement