ComputerWeekly.com Research Library

Powered by Bitpipe.com

Instant Messaging Security Research

  • Best Practices for Stopping Risk in its Tracks

    Sponsored by: Smarsh

    How can firms improve their supervision workflows to better reveal risk? In this guide, examine some strategies for staying on top of the rapidly evolving communications landscape, and the new vectors for risk it offers.

  • The Financial Advisor's Guide to Compliant IM and Collaboration

    Sponsored by: Smarsh

    Download this guide to learn the key steps to enabling modern instant messaging and collaboration platforms while maintaining compliance.

  • Mitigations for Mobile Phishing Problems on the iOS Platform

    Sponsored by: SearchSecurity.com

    Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.

  • Microsoft® Lync® Server 2010 on DellTM Systems

    Sponsored by: Dell EMC and Microsoft

    This critical resource provides configurations that can be used to architect Lync 2010 infrastructures ranging from 500 to 25,000 users so that you organization's communications are efficient and effective.

  • Endpoint Security and Control

    Sponsored by: Sophos

    Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.

  • Cisco ASA 5500 Series Business Edition Solution

    Sponsored by: Cisco Systems, Inc.

    The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, so you can feel confident your business is protected.

  • Advantages of Integrated Messaging Security

    Sponsored by: Symantec Corporation

    This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...

  • Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats

    Sponsored by: Symantec Corporation

    This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.

  • Enterprise Messaging Security and Management

    Sponsored by: Symantec Corporation

    Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...

  • Symantec IM Manager

    Sponsored by: Symantec Corporation

    Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.

  • Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage

    Sponsored by: Symantec Corporation

    Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.