IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed   
IM Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

DevOps Security for Cloud and Containers
sponsored by Lacework
EBOOK: In this e-book, learn how technology differences between development, staging, and product environments can lead to much larger security problems, how microservices deployed as containers help eliminate vulnerabilities, and much more.
Posted: 30 May 2019 | Published: 30 May 2019

Lacework

Crowdstrike Falcon Complete:How To Achieve Instant Cybersecurity Maturity For Organizations Of All Sizes
sponsored by CrowdStrike
WHITE PAPER: The shortage of cybersecurity resources and expertise can lead organizations to struggle with implementing the security technology they acquire. In this white paper, learn how CrowdStrike Falcon Complete can solve these challenges by combining Falcon endpoint protection platform with a dedicated team of security professionals.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Is Your Business Data Protected? Take Our 5 Question Data Security Quiz to Find Out
sponsored by ECi
EBOOK: Is your data protected enough? Take this data security quiz to determine if your level of data security is adequate for your business.
Posted: 14 Jun 2019 | Published: 14 Jun 2019

ECi

Enterprise SD-WAN in the Real World
sponsored by Forcepoint
WEBCAST: While many companies identify a need to evolve to SD-WAN, they are not always convinced SD-WAN can deliver the necessary enterprise capabilities. In this webcast, learn how Link-Connect implemented Forcepoint NGFWs to deliver enterprise-class SD-WAN to manage more than 400 sites from a single management console.
Posted: 12 Jun 2019 | Premiered: Jun 12, 2019

Forcepoint

Advanced Threat Protection Beyond the AV
sponsored by Cynet
WHITE PAPER: While large enterprises can cover attack surfaces with a SIEM or employ a staff of skilled SOC analysts, mid-sized organizations have to address similar cyber-risks with significantly less resources. In this white paper, discover strengths and weaknesses of two Advanced Threat Protection approaches: Endpoint Protection and Network Analytics.
Posted: 04 Jun 2019 | Published: 04 Jun 2019


Qualcomm's Alex Gantman on Bug Bounties
sponsored by HackerOne
CASE STUDY: Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.
Posted: 14 Jun 2019 | Published: 22 Jun 2017

HackerOne

Avoid the Breach With Effective Application Security Testing
sponsored by HackerOne
WEBCAST: Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

Solution Brief: Real-Time Deep Memory Inspection
sponsored by SonicWall
PRODUCT REVIEW: Learn about SonicWall Real-Time Deep Memory Inspection technology and how it can catch more malware faster than behavior-based sandboxing methods, with a lower false positive rate.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

SonicWall

Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes
sponsored by Proofpoint
CASE STUDY: When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Proofpoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement