Title: Webcast Alert
October 06, 2004 Published by  SearchExchange.com

Webcast Alert

SearchExchange.com
NEWS     TOPICS     ITKNOWLEDGE EXCHANGE     TIPS     ASK THE EXPERTS     WEBCASTS     WHITE PAPERS    
UPCOMING WEBCASTS 
Receive valuable best practices and expert recommendations from Michael Osterman, President of Osterman Research, on minimizing the destructive impact of spam beyond deploying good spam-blocking technology.

EXPERT WEBCAST
Anti-spam best practices
WHEN: October 13, 2004 - AVAILABLE ON DEMAND
SPEAKER: Michael Osterman, President of Osterman Research
SPONSOR :   Postini, Inc.


ABOUT THE WEBCAST:
Any IT administrator or e-mail user can attest to the fact that the spam problem continues to worsen. Spam clogs networks, it reduces user productivity, it consumes IT resources and it creates a host of other problems for end users, IT staff and enterprises in general. However, in addition to deploying good spam-blocking technology, there are a number of best practices that an enterprise can implement to reduce the impact of spam. Michael Osterman, president of Osterman Research, will discuss those practices and offer recommendations that an enterprise and individual users can follow to minimize the impact of spam. He will also explore current regulations and technical issues that impact the spam problem.

ABOUT THE SPEAKER:
Michael Osterman, President of Osterman Research

Michael Osterman, president of Osterman Research, has more than 20 years of experience in the market research industry, conducting research for a wide variety of technology based clients including Microsoft, Hewlett Packard, KVS, Sun Microsystems and EMC. He has written numerous articles for a variety of trade publications and has spoken at a number of computer industry conferences.

REGISTER FOR THE WEBCAST

About the Sponsor



Free White Paper: How spammers are stealing your email directory
Did you know that spammers are probing your email system in an attempt to identify and "harvest" legitimate email addresses from your organization? This is what is know as the "silent killer" or "directory harvest attack" (DHA). A rising industry threat, you may have already observed some of the symptoms of these virtually undetectable attacks on your email systems. Learn what you can do today to protect your organization from these attacks.
> Click here to download this free white paper!



VIEW WEBCASTS 
Get informed. Check out all our available webcasts to get the information you need to make the right IT Business decisions from leading industry experts and vendors.

View all Webcasts

  FREE E-MAIL SERVICES!
    Enter your e-mail and start receiving TechTarget Conference Updates.
    E-mail:     Not a member? We'll activate your
membership with your subscription.

  A B O U T   T H I S   A L E R T
TechTarget
Contact us:
SearchExchange
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

This e-newsletter is published by SearchExchange.com, a targeted Web site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals.
Copyright 2004 TechTarget. All rights reserved.

To unsubscribe from "Webcast Alert":

Go to unsubscribe: http://searchExchange.techtarget.com/unsubscribe?track=NL-129&ad=493713

Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Reply via email to