IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed   
Instant Messaging Spam Reports
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Securing Cloud Transformation with a Zero Trust Approach
sponsored by Zscaler
WHITE PAPER: Cybersecurity wasn't designed for the cloud, and even though traditional network security solutions are being retrofitted for "cloud" usage, security is getting in the way of the adoption of zero trust strategies. In this white paper, learn why transforming to the cloud calls for zero trust network access (ZTNA) services.
Posted: 20 Aug 2019 | Published: 20 Aug 2019


IT Security and Risk: Intelligent Automation Eases the Burden
sponsored by Oracle Corporation
EBOOK: To protect the enterprise and its assets effectively, the security team must be internal decision-makers and providers. This entails using intelligent automation to secure the assets wherever they are deployed. Download this article to learn more about the importance of automation in security today.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Oracle Corporation

5 Things to Keep in Mind When Choosing a Single Sign-On Solution
sponsored by Citrix
EBOOK: A single sign-on solution is meant to reduce cost of management, provide better security and improve the user experience. In this e-book, discover the 5 things to prioritize when choosing a single sign-on (SSO) solution.
Posted: 13 Aug 2019 | Published: 13 Aug 2019


Security Powered by Understanding
sponsored by Armorblox
PRODUCT OVERVIEW: Social engineering has become the top attack vector for stealing data, and even experienced users struggle to mitigate these risks. Traditional DLP solutions are ineffective in detecting such risks because they lack context. In this brief, learn how Armorblox brings contextual understanding to security.
Posted: 22 Aug 2019 | Published: 22 Aug 2019


High Alert Chapter 2: Skills Crisis Infographic
sponsored by Symantec
RESOURCE: New research from Symantec uncovers the huge challenge organizations face in attracting, retaining and nurturing the right caliber of cybersecurity professionals. Download this infographic to find key statistics from the research. Also, explore 3 ideas for tackling the skills shortage.
Posted: 22 Aug 2019 | Published: 22 Aug 2019


Symantec Web Security Service: Advanced Cloud-Delivered Network Security for the Cloud Generation
sponsored by Symantec
PRODUCT OVERVIEW: Today's enterprise-security reality: Devices, data, and applications are outside of your physical control—and all of it must be managed and secured. In this guide, learn about advanced security tools that can help you overcome the security challenges of the cloud generation.
Posted: 21 Aug 2019 | Published: 21 Aug 2019


The SIEM's Buyers Guide for 2020
sponsored by Splunk
WHITE PAPER: In short, a SIEM is a security platform that ingests event logs and offers a single view of this data with additional insights—but as with all growing tech offerings right now, its current capabilities may be far more than you are aware. Read this white paper to learn about the evolution of SIEM, and 9 technical capabilities of a modern SIEM.
Posted: 14 Aug 2019 | Published: 14 Aug 2019


Proofpoint Information Protection Research Team
sponsored by Proofpoint
RESOURCE: Check out this blog to learn why your organization could benefit from a layered, intelligent security measure, such as user education to combat evolving threats that are increasingly successful in compromising user cloud accounts.
Posted: 22 Aug 2019 | Published: 22 Aug 2019


How IT Administrators Are Tackling Active Directory and Security
sponsored by Zoho
RESOURCE: ManageEngine conducted a global survey to identify the various Active Directory (AD) and IT security issues admins face – and the results were shocking. The stats ManageEngine saw broke certain assumptions they held about how admins went about tackling various issues. In this infographic, explore the stats.
Posted: 15 Aug 2019 | Published: 15 Aug 2019


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement