IM Spam White Papers

(View All Report Types)
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

11 Required Monitoring Platform Capabilities for Enterprise DevOps Teams eBook
sponsored by Datadog
WHITE PAPER: As DevOps teams work with an unprecedented volume of data, effective end-to-end monitoring is a key capability for any DevOps initiative. Here, explore the 11 required monitoring platform capabilities for enterprise DevOps teams. Download it here.
Posted: 10 Dec 2021 | Published: 21 Jan 2021

Datadog

Identity Security: Why it Matters and Why Now
sponsored by CyberArk
WHITE PAPER: It is no longer a question of if an organization will be hit by a cyber attack but a question of when. Read this paper to learn why Identity Security could be the key factor in preventing cyber attacks from happening.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TOPICS:  IT Management
CyberArk

Unlock Endless Possibilities with Easy to Use AI Tools
sponsored by Slack
WHITE PAPER: Enable smarter and more secure collaboration with simple access to AI-powered time-savers.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

Boost Your Team's Output: 5 Key Productivity Hacks
sponsored by Slack
WHITE PAPER: Eliminate productivity blockers and uncover five best practices for streamlining and automating your team's workflows.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

The Relationship Between Security Maturity and Business Enablement
sponsored by AT&T Cybersecurity
WHITE PAPER: AT&T Cybersecurity, in partnership with ESG, completed a research survey to parallel the NIST cybersecurity framework by assessing organizations’ postures across the 5 foundational cybersecurity functions from the framework: Identify, Protect, Detect, Respond, and Recover. Read on to uncover the results.
Posted: 08 Feb 2021 | Published: 20 May 2020

AT&T Cybersecurity

Extreme File System Performance on Supermicro Servers
sponsored by Supermicro
WHITE PAPER: Check out this white paper to learn about Supermicro's next-gen X12 BigTwin hardware, featuring 3rd Generation Xeon® Scalable Processors supporting up to 40 cores, higher instructions per clock, and two 512-bit-FMA units.
Posted: 08 Sep 2021 | Published: 08 Sep 2021

TOPICS:  IT Management
Supermicro

Take Control of Diverse and Rapidly Evolving Enterprise Risks
sponsored by ServiceNow and NewRocket
WHITE PAPER: ServiceNow® works with organizations around the world to help them effectively manage enterprise risk and compliance. This paper identifies three key pillars for success that allow those organizations to respond proactively and consistently to the full spectrum of risks they face.
Posted: 11 Jan 2023 | Published: 11 Jan 2023

TOPICS:  IT Management
ServiceNow and NewRocket

Cybercriminals are Resilient. How About You?
sponsored by ServiceNow
WHITE PAPER: Read this paper to learn how in order to be a successful security leader you must be intent on building a proactive, agile, and cyber-resilient organization to help understand how your adversaries operate which will help mitigate risk.
Posted: 28 Sep 2021 | Published: 28 Sep 2021

TOPICS:  IT Management
ServiceNow

Real-Time Monitoring in Complex Data Centers
sponsored by Beta Systems
WHITE PAPER: When it comes to running your data center, it’s obvious that monitoring is an essential component of successful data centers. Access this e-guide to learn the 6 essential steps for building effective real-time monitoring across your hybrid IT data center.
Posted: 04 Nov 2021 | Published: 30 Oct 2020

Beta Systems