TechTarget's Security Media Group presents a comprehensive guide to secure collaboration software. Our experts help you address the security concerns of collaboration and social networking technologies and offer best practices for locking down voice communications via VoIP or Skype. Access >>>
Table of contents
- Corporate Policies for Instant Messaging Security Issues
- A Policy Template for Information Awareness Training
- Securing VoIP Communication in the Workplace
- Pros and Cons of Skype Security for Encrypted Phone Calls
Access TechTarget
Premium Content for Free.
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO