secure instant messaging

Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name
By: mindSHIFT     Published Date: Nov 29, 2007
A millisecond of downtime can mean millions of dollars. Maintaining compliance while ensuring your firm has the required speed and uptime can be daunting. Learn what you can do with your email and instant messages to prepare for your next regulatory audit.
Tags : secure im, secure instant messaging, audit, security audit, auditing, compliance, email security, high availability, mindshift
     mindSHIFT
By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging
     Trend Micro SPN
By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging
     Trend Micro SPN
By: IBM     Published Date: Mar 04, 2009
Celina Insurance case study that shows cost reduction and increased productivity - faster, better service to agents and their customers due to integrated systems and real-time collaboration; being “easy to do business with” secures agent loyalty; 50 percent reduction in phone calls and costs due to instant messaging option, and 40 percent reduction in head count while maintaining the same volume of business due to streamlined processes.
Tags : lotus software, ibm, celina insurance, lotus extranet, streamlined processes, reduction in intranet traffic, integrated systems, lotus notes, domino 8, networking, software development
     IBM
By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
     Sigaba
By: Sigaba     Published Date: Aug 21, 2009
This white paper describes how Sigaba's secure email solutions minimize the burden on IT organizations through a combination of easy integration with existing enterprise systems and simple maintenance.
Tags : access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
     Sigaba
By: Sigaba     Published Date: Aug 21, 2009
This paper presents the business case for secure messaging, which extends far beyond compliance issues. In fact, choices about when to implement secure messaging affect every aspect of banking.
Tags : financial, bank, access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba
     Sigaba
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com