IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Secure Instant Messaging

RSS Feed   
Secure Instant Messaging White Papers (View All Report Types)
 
Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Microsoft® Lync® Server 2010 on DellTM Systems
sponsored by Dell EMC and Microsoft
WHITE PAPER: This critical resource provides configurations that can be used to architect Lync 2010 infrastructures ranging from 500 to 25,000 users so that you organization's communications are efficient and effective.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell EMC and Microsoft

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

New Survey Shows Integrating Application Security Testing Gaining Traction In Devops
sponsored by Synopsys
WHITE PAPER: Security professionals are focusing on DevOps to break traditional application security testing processes and tools—and for good reason. In this article, learn why an integrated DevSecOps approach is critical to building better code. Read the article here to see how your team can apply DevSecOps to your strategies.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

TOPICS:  Security
Synopsys

The Path To Zero Trust Starts With Identity
sponsored by CyberArk Software, Inc
WHITE PAPER: Identity-defined Zero Trust is a complex topic that touches almost every aspect of an organization's IT and security infrastructure. This report represents the collective experience and thought leadership of the Identity Defined Security Alliance (IDSA) and offers a unique and practical approach to understanding Zero Trust.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

CyberArk Software, Inc

Five Technologies That Can Enable Dynamic Business Planning And Analytics
sponsored by KPMG LLP
WHITE PAPER: Today’s Oracle EPM customers are employing innovative technologies featuring predictive analytics, utilizing artificial intelligence and machine learning to anticipate changing business drivers, modify organizational objectives, and provide greater insights resulting in better budgeting, planning and forecasting.
Posted: 15 Jun 2021 | Published: 15 Jun 2021

TOPICS:  IT Management
KPMG LLP

Planview Agile Program Management
sponsored by Planview, Inc.
WHITE PAPER: Check out this data sheet to learn just what goes into an Agile Program Management Solution, see the return on investments that it can lead to, and discover why Planview is a vendor of choice no matter where you are on the transformation journey.
Posted: 06 May 2021 | Published: 06 May 2021

TOPICS:  IT Management
Planview, Inc.

Now’s the Time for an Integrated, Holistic and Cloud-Delivered Cybersecurity Model for Business Communications Services
sponsored by NWN Corporation
WHITE PAPER: Today's work-from-anywhere environment is giving organizations a golden opportunity to reevaluate their approach to cybersecurity and migrate to a model that is tightly aligned with the challenges their organization is facing. Download this white paper to learn more.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

TOPICS:  Security
NWN Corporation

The Observability Hierarchy Of Needs
sponsored by Cribl.io
WHITE PAPER: Implementing an observability pipeline gives enterprises access to their logs, metrics and traces, accelerating root cause analysis of performance challenges. Observing infrastructure, rather than just monitoring it, can improve customer satisfaction, increase revenue, and lower infrastructure costs. Open up this paper to learn more.
Posted: 11 May 2021 | Published: 11 May 2021

TOPICS:  IT Management
Cribl.io
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences