IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

IM Security

RSS Feed   
IM Security White Papers (View All Report Types)
 
Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Microsoft® Lync® Server 2010 on DellTM Systems
sponsored by Dell EMC and Microsoft
WHITE PAPER: This critical resource provides configurations that can be used to architect Lync 2010 infrastructures ranging from 500 to 25,000 users so that you organization's communications are efficient and effective.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell EMC and Microsoft

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Securing Students’ Safety Everywhere
sponsored by Cisco Umbrella
WHITE PAPER: Cloud apps enable students and staff to improve productivity, simplify collaboration and reduce on-premises IT costs. But they can introduce a new set of security challenges. Find out why security built into the foundation of the internet is better at providing visibility into internet activity across all users and devices, on and off-campus.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Cisco Umbrella

Effective Healthcare Data Breach Response
sponsored by Absolute Software Corporation
WHITE PAPER: Because medical data is so valuable, the FBI has warned that cybercriminals are targeting healthcare providers more than any other industry. Luckily, this white paper outlines 6 steps to effective data breach response. Read on to make sure you have the right plan of action in case of a breach.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Absolute Software Corporation

The Case for Collective Defense
sponsored by IronNet
WHITE PAPER: In this e-book, learn about the concept of collective defense and how the democratization of an advanced and powerful cyberdefense that applies behavioral detection at scale across entire industry sectors is revolutionizing how companies of all sizes are addressing cybersecurity.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

IronNet

Who is GOSSIPGIRL?
sponsored by Chronicle
WHITE PAPER: Flame (aka Flamer or sKyWIper) was the object of extensive research and fascination by the security community circa 2011. Flame proved to be one of the most daring threat actors ever discovered. This whitepaper investigates the connection between Flame and the O.G. threat actor super group, GOSSIPGIRL. Read on to learn more.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Chronicle

The Case for Work Designed Around Your Life
sponsored by ServiceNow
WHITE PAPER: Learn how to create a “consumerized” employee experience by utilizing the latest digital technologies – and find out how IT leaders can encourage employees to maximize their technology adoption.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

ServiceNow

The Rise of the Open Source Program Office
sponsored by Fossa
WHITE PAPER: Open source software is fundamentally different from proprietary software. Often, different teams use and/or build open source differently. Because of this variability, it needs to be approached differently. Managing this strategy is the job of the OSPO (Open Source Program Office). But what is an OSPO and how do you build one? Read on to find out.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Fossa
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info