IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed   
IM Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

NIST Cybersecurity Framework
sponsored by One Identity
WHITE PAPER: This white paper provides an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

Data Protection is a Business Challenge
sponsored by Veritas
RESOURCE: Outages and data losses can have terrible business consequences. They are not simply short-time events; they cause significant, lasting disruptions. Direct loss of revenue is just the beginning of the potential negative outcomes from outages and data loss. In this infographic, learn about the data protection challenges that organizations face.
Posted: 19 Mar 2019 | Published: 31 Dec 2018

Veritas

Transforming IT into a Catalyst for Business Growth
sponsored by ServiceNow
WHITE PAPER: Discover how ServiceNow's Change and Governance framework can help establish a higher degree of change clarity, regulatory compliance, and ultimately increase the visibility and strategic value of the entire change portfolio.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

ServiceNow

No Time to Lose: How to Help Ensure Your ICS Infrastructure Complies with the EU's NIS Directive
sponsored by ForeScout
EBOOK: This e-book explains the NIS Directive and its implications for essential service providers that depend on ICS networks to operate effectively. It also defines how essential service providers should assess solutions designed to support NIS compliance.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

ForeScout

Meeting Corporate Requirements for Comprehensive Security for Users and Their Devices
sponsored by Lenovo
RESOURCE: Perhaps the most common point of attack is user devices. With inconsistent security tools and many PCs running insecure software stacks, there are numerous ways these devices are compromised. In this article, learn how combining more secure operating systems and devices that automate key security processes is essential to protecting organizations.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Lenovo

Best Practices in Transaction Monitoring Scenario Threshold Tuning and Model Verification
sponsored by SAS
WHITE PAPER: How can your bank lower the cost of compliance? In this white paper, discover the analytic techniques responsible for reducing the costs of compliance within AML banking programs, and explore how implementing a process of periodic model verification, threshold tuning, and validation, can optimize your banks AML compliance standards.
Posted: 18 Mar 2019 | Published: 31 Dec 2017

SAS

Crossing the Legacy ITSM Chasm
sponsored by ServiceNow
WHITE PAPER: This exclusive report examines "next-generation ITSM" and its contributions towards changing IT and business requirements. Download now to compare advances with the risks of staying with legacy ITSM models and evaluate the risks of "doing nothing" and allowing legacy ITSM to persist.
Posted: 18 Mar 2019 | Published: 28 Feb 2018

ServiceNow

Security Analytics Platforms, Q3 2018
sponsored by LogRhythm, Inc.
RESEARCH CONTENT: In Forrester's 30-criteria evaluation of security analytics platform providers, they identified the 13 most significant ones. This report shows how each provider measures up and helps S&R professionals make the right choice.
Posted: 15 Mar 2019 | Published: 21 Sep 2018

LogRhythm, Inc.

Automating Phishing Investigations at the No. 1 Managed Cloud Company
sponsored by Splunk Services UK Ltd
CASE STUDY: Rackspace implemented Splunk Phantom to investigate phishing emails. Using Phantom's Apps and Playbooks, Rackspace is able to quickly execute actions, ensuring a repeatable and auditable process for remediating phish. In this case study, explore the benefits that Rackspace has seen since deploying Phantom.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk Services UK Ltd
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement