SC Magazine Australia/NZ / White Papers / Technology / Security / Secure Instant Messaging

Secure Instant Messaging

Instant Messaging requires the use of a client program that hooks up an instant messaging service and differs from e-mail in that conversations are then able to happen in realtime. Most services offer a presence information feature, indicating whether people on one's list of contacts are currently online and available to chat.
Results 1 - 25 of 62Sort Results By: Published Date | Title | Company Name
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Security is a top priority at Citrix. This whitepaper is meant to delve into the technical details of the security around the Citrix XenMobile solution and each of its components. Details include how Citrix implements secure mobile device management, mobile application management, mobile content management and more
Tags : citrix, xenmobile, mobile, security, mobile device management, mobile app management, mobile content management, secure instant messaging, wireless infrastructure, wireless messaging, wireless phones, wireless security, collaboration, messaging, secure content management
     Citrix Systems, Inc.
By: Aerohive Networks     Published Date: May 06, 2015
Learn how organizations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : wi-fi, security, network security, bandwith limitations, ssid, security management, security policies, secure instant messaging, web service security, vulnerability management
     Aerohive Networks
By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : mobile device security, byod, application security, data security, network security, access control, ssl, secure instant messaging, web service security, vulnerability management
     IBM MaaS360
By: Symantec     Published Date: Nov 19, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security, encryption, firewalls, hacker detection, high availability, identity management, internet security, intrusion detection, intrusion prevention, secure instant messaging, web service security, vulnerability management
     Symantec
By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics, business continuity, compliance, ddos, disaster recovery, email security, encryption, firewalls, hacker detection, high availability, identity management, internet security, intrusion detection
     Thawte
By: McAfee     Published Date: Jan 28, 2014
BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.
Tags : endpoint encryption, epolicy orchestrator, drive encryption, anti spam, anti spyware, anti virus, encryption, internet security, secure instant messaging
     McAfee
By: Citrix     Published Date: Aug 15, 2012
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. This paper describes how you can simplify application mobilization with Citrix.
Tags : citrix, xenapp, windows applications, microsoft applications, windows, microsoft, mobilizing applications, mobile devices, secure instant messaging, mobile computing, mobile data systems, smart phones, wireless application software, wireless messaging, application integration, workforce management, microsoft exchange, windows server, content delivery
     Citrix
By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
     Symantec
By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
     Symantec
By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, auditing
     Symantec
By: Symantec     Published Date: Apr 09, 2012
Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.
Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, access control, anti spam, anti spyware, anti virus, application security, authentication
     Symantec
By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication, migration, security, performance, version 6, internet protocol, ipv4, ipv6, security, video traffic, cloud infrastructure, network performance, networking
     Cisco
By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, access control, anti spam
     Lumension
By: NetIQ     Published Date: Dec 08, 2011
Learn more about Automating Active Directory in this informative webcast and how it enables security professionals to automate repetitive tasks.
Tags : automating, webcast, security, vulnerabilities, resources, productivity, access control, application security, authentication, business continuity, disaster recovery, email security, hacker detection, high availability, identity management, internet security, intrusion detection, intrusion prevention, network security appliance, policy based management
     NetIQ
By: Webroot     Published Date: Dec 06, 2011
In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security
Tags : security, facilities, evolve, communication, collaboration, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics, business continuity, compliance, ddos, disaster recovery, email security, encryption, firewalls
     Webroot
By: Webroot     Published Date: Dec 06, 2011
Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.
Tags : saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring, best practices, virtualize, virtualization, challenges, it security, security, on-premise, access control, anti spam, anti spyware, anti virus, application security
     Webroot
By: ZScaler     Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.
Tags : cloud security, botnet, phishing, advanced threats, policy compliance, dlp, saas, email gateway, web gateway, mobile security, ssl protection, web 2.0, bandwidth management, ips, mobile devices, saml, access control, anti spam, application security, encryption
     ZScaler
By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls, anti-virus, threats, solutions, webpulse, defense, cloud, access control, anti spam, anti spyware, anti virus, application security, authentication
     Blue Coat Systems UK
By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring, access control, anti spam, anti spyware, anti virus, application security, disaster recovery, encryption, firewalls, hacker detection, high availability, identity management
     Blue Coat Systems UK
By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave, human resources, p2p, social media, blogging, blog, instant message, instant messaging, peer-to-peer, peer-2-peer, policies, filtering, security
     EdgeWave
By: Secunia     Published Date: Oct 12, 2011
This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.
Tags : application security, authentication, email security, high availability, identity management, internet security, intrusion detection, intrusion prevention, network security appliance, patch management, security management, secure instant messaging, web service security, vulnerability management
     Secunia
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.