IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

IM Security

RSS Feed   
IM Security White Papers (View All Report Types)
 
Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Microsoft® Lync® Server 2010 on DellTM Systems
sponsored by Dell EMC and Microsoft
WHITE PAPER: This critical resource provides configurations that can be used to architect Lync 2010 infrastructures ranging from 500 to 25,000 users so that you organization's communications are efficient and effective.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell EMC and Microsoft

A Guide to Achieving SaaS Security and Compliance
sponsored by Forcepoint
WHITE PAPER: The nature of today's organizations is being driven by employees' demands for greater flexibility, productivity, and mobility. While SaaS applications fulfill these user demands, they also pose visibility and control challenges for IT. In this white paper, learn how SaaS applications can be effective at meeting users' needs without posing risks.
Posted: 14 May 2019 | Published: 14 May 2019

Forcepoint

Using SD-WAN to Enhance your Security Posture
sponsored by Open Systems Technologies
WHITE PAPER: The use of SD-WAN is dramatically increasing, and in many cases, it is a means of reducing network complexity that can create vulnerabilities. However, SD-WAN is just the starting point for reducing risk. Download this white paper to learn more about the benefits of secure SD-WAN today.
Posted: 09 May 2019 | Published: 09 May 2019


Unintended Consequences in Digital Transformation: 7 Lessons from Major Brands
sponsored by Capriza
WHITE PAPER: Open up this article to read through seven accounts from major brands like Nike, LEGO, Google, and more as they explore the roadblocks they encountered in their own digital transformation projects – and find out how they ultimately overcame them.
Posted: 10 May 2019 | Published: 10 May 2019

Capriza

Managing Usage Risks on Corporate Mobile Devices
sponsored by Wandera
WHITE PAPER: This whitepaper explores the benefits of analyzing usage-based mobile risks, analyzing five main areas: shadow IT, security, productivity, legal considerations and expense management. Read on to learn how Wandera's mobile data policy can benefit your organization today.
Posted: 10 May 2019 | Published: 10 May 2019

Wandera

The Basics of Auditing and Securing Your Network Perimeter with SIEM
sponsored by ManageEngine
WHITE PAPER: To thwart network attacks, you first need to be on top of critical security events occurring in your network. But due to the high volume of events, auditing these events in real time can be challenging, if not impossible. In this white paper, learn about the basics of auditing and securing your network perimeter by leveraging SIEM.
Posted: 10 May 2019 | Published: 10 May 2019

ManageEngine

The CISO's Ultimate Guide to Securing Applications
sponsored by Synopsys
WHITE PAPER: In The CISO's Ultimate Guide to Securing Applications, discover the tools and services you need to get your application security program on track.
Posted: 13 May 2019 | Published: 13 May 2019

Synopsys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement