IM Spam White Papers

(View All Report Types)
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Enterprise Resource Planning Software: Taking the Plunge
sponsored by VAI, Vormittag Associates, Inc.
WHITE PAPER: Check out this white paper to discover the many benefits of Enterprise Resource Planning (ERP) software.
Posted: 20 Mar 2009 | Published: 20 Mar 2009

VAI, Vormittag Associates, Inc.

Five Things Your IT Resources Should Be Telling You - And Aren't
sponsored by Unisys
WHITE PAPER: This whitepaper describes the types of information IT managers should expect to gain from leading-edge IT resource governance tools.
Posted: 22 Jan 2009 | Published: 22 Jan 2009

Unisys

The Top Five Virtualization Mistakes
sponsored by Vyatta Inc.
WHITE PAPER: This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
Posted: 17 Jun 2009 | Published: 01 Jun 2007

Vyatta Inc.

ePlus Technology IT Sourcing, Services, Support & Solutions
sponsored by ePlus Technology
WHITE PAPER: ePlus Technology helps you develop cost-effective strategies that meet your immediate IT needs as well as your long-term business objectives - letting you focus on your core business. When combined with our suite of on-demand supply chain and financing solutions, ePlus IT services will help you improve asset utilization across your organization.
Posted: 24 Apr 2009 | Published: 28 Dec 2007

ePlus Technology

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5
sponsored by Symantec Corporation
WHITE PAPER: Download this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.
Posted: 02 Oct 2008 | Published: 02 Oct 2008

Symantec Corporation

Making Web 2.0 Work for Your Enterprise: Internal Deployments
sponsored by Oracle Corporation
WHITE PAPER: Making knowledge more visible increases innovation and shortens turnaround times. Increased collaboration accelerates productivity. With Web 2.0, your company transforms into a more-socially connected organization that reacts faster and more effectively to the market.
Posted: 03 Apr 2009 | Published: 01 Aug 2008

Oracle Corporation

When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
sponsored by Sunbelt Software
WHITE PAPER: Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Sunbelt Software

Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos
WHITE PAPER: This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008

Sophos