IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed   
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 20 May 2020 | Published: 25 Mar 2020

Barracuda

XDR For Users
sponsored by Trend Micro
DATA SHEET: Given that 94% of malware incidents come from email, combining email with endpoint detection and response is a powerful capability. Learn about the key capabilities and benefits of Trend Micro XDR for Users, a complete SaaS offering that includes protection, detection, and response across endpoints and email.
Posted: 21 May 2020 | Published: 21 May 2020

Trend Micro

7 Ways to Take Cybersecurity to New Levels
sponsored by Cisco Umbrella
WHITE PAPER: Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.
Posted: 21 May 2020 | Published: 21 May 2020

Cisco Umbrella

CJIS Security Policy Evaluation Guide
sponsored by Absolute Software Corporation
DATA SHEET: IT and Information Security teams need to be equipped with powerful, versatile tools that will allow them to increase their operational efficiency. Download this overview to see how Absolute helps protect regulated data, eliminate compliance failures, and respond rapidly to security exposures.
Posted: 27 May 2020 | Published: 27 May 2020

Absolute Software Corporation

Winnti: More than just Windows and Gates
sponsored by Chronicle
WHITE PAPER: While reviewing a report of a Winnti malware intrusion at a Vietnamese gaming company, Chronicle researchers identified a small cluster of Winnti samples designed specifically for Linux. Download this white paper for a technical analysis of this variant.
Posted: 20 May 2020 | Published: 20 May 2020

Chronicle

USM Case Study
sponsored by Matrix42
CASE STUDY: In this case study, follow the journey of USM, an international furniture system manufacturer, as they partner with Matrix42 to integrate a client management tool designed to unify and manage their growing number of endpoints. Read on to unlock the results.
Posted: 26 May 2020 | Published: 26 May 2020

Matrix42

Getting Cloud Security Right
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we will consider how to do cloud security right. Regular Computer Weekly contributor Peter Ray Allison explores this issue, weighing up the questions organisations should be asking of their cloud service providers, and whose responsibility cloud security should be.
Posted: 25 May 2020 | Published: 11 May 2020

ComputerWeekly.com

Couchbase-as-a-Service Using Containers and Kubernetes – Connect New York 2018
sponsored by Red Hat and Couchbase
WEBCAST: Managing multiple clusters can be quite the headache. Even more, deploying and managing multiple clusters results in high operational costs. The solution? With a NoSQL data platform, developers can scale for cloud and container-based environments with surprising speed—and at a reduced cost.
Posted: 21 May 2020 | Premiered: May 13, 2018

TOPICS:  IT Management
Red Hat and Couchbase

This Is Why Security Matters
sponsored by Hewlett Packard Enterprise
WHITE PAPER: There are a myriad of risks presented to enterprise computer users, and these risks have multiplied during the current lockdown. Check out this resource to learn how HP leverages Intel and AMD features to combat security threats, why they endorse Windows 10 for their hardware, and what steps they themselves are taking to protect users.
Posted: 27 May 2020 | Published: 27 May 2020

Hewlett Packard Enterprise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info