IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed   
IM Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

A Guide to Digitally Transforming Your Organization
sponsored by Cisco Meraki - APAC
WHITE PAPER: Download this white paper to lean about a Cisco Meraki cloud-managed IT suites which include features like wireless access points, security appliances, endpoint management and more. Learn how a cloud-managed IT suite can help simplify your digital transformation.
Posted: 14 Dec 2018 | Published: 14 Dec 2018

Cisco Meraki - APAC

Balancing Digital Experience and Security
sponsored by Akamai Technologies
RESOURCE: As organizations seek to improve customer experiences, they must enable increasingly fast, streamlined, simple and safe digital experiences. This executive summary aims to help readers understand how digital businesses across the globe align user experience and security with their strategic priorities.
Posted: 17 Dec 2018 | Published: 31 Mar 2018

Akamai Technologies

Make Your Breakthrough in Governance and Compliance
sponsored by Bizagi Ltd
RESOURCE: In this report, explore the benefits of digitizing compliance, how other companies have had success doing so, how to tackle your compliance challenges, and more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Bizagi Ltd

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: As the technology we use at work expands, speed has never been more important for security operations teams. Security orchestration and automation is becoming a vital aspect of many organizations' security strategies. In this white paper, learn how many companies are using it to successfully tackle common security processes and investigation types.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

Managing Mobile Risk in Healthcare
sponsored by MobileIron
RESOURCE: It's extremely important in the healthcare industry for organizations to secure their endpoints – mobile devices included. In this resource, learn how you can use a threat defense application to enhance the security and privacy of your endpoints and protect patient data against cyberattacks.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

MobileIron

Increase Visibility into SSL Encryption to Boost Security
sponsored by F5 Networks
WHITE PAPER: Regaining visibility into encrypted traffic is one of the most important steps you can take to protect your apps, your data, and your business. Find out how SSL/TLS orchestration can help you get that visibility and deliver high-performance decryption and encryption of outbound TLS traffic—without slowing your traffic down.
Posted: 30 Nov 2018 | Published: 30 Nov 2018

F5 Networks

Reduce Risk and Protect Privacy Across Enterprise Systems
sponsored by Micro Focus
PRODUCT OVERVIEW: A staggering amount of organizations are storing sensitive business data in inactive file shares, creating an increased risk of data loss. With data breaches on the rise, poorly protected data makes your business an easy target. Discover the advantages of a secure content management system. Reduce the cost and complexity of securing your data.
Posted: 06 Dec 2018 | Published: 30 Jun 2018

Micro Focus

What's Threatening IT Security?
sponsored by Aruba Networks
RESOURCE: What are the causes of gaps in IT security? Is the Internet of Things making it worse? Can AI and automation fix it? Download this resource to see what the Ponemon Institute recently found.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Aruba Networks

VMware Pulls vSAN 6.7 Deeper into vSphere
sponsored by VMware and Intel
EGUIDE: Read this e-guide to learn how vSAN's tighter vSphere integration works, how the release differs from past releases of vSAN, and more granular information on the latest update from our SearchStorage.com Editorial Director Dave Raffo.
Posted: 29 Nov 2018 | Published: 27 Nov 2018

VMware and Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement