IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone SpamMultimedia (View All Report Types)
 
Secure Mobile Printing with UniPrint
sponsored by Citrix Ready and UniPrint
WEBCAST: In today's "Mobile First, Cloud First" environment, as IT professionals, how do you ensure all these highly mobile knowledge-workers print securely? To find the answers, please attend this timely webinar from Citrix and UniPrint.
Posted: 03 Oct 2014 | Premiered: Oct 3, 2014

Citrix Ready and UniPrint

How to Detect System Compromise and Data Exfiltration
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how cyber criminals target your vulnerabilities and offers a demo of a unified security management platform to help you combat these attacks.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault

Protect Your Business from DDoS and Web Application Attacks
sponsored by Akamai Technologies
VIDEO: A solution more and more companies are turning to is cloud based service approach. You can scale the service to deal with ever increasing threats in a cost effective manner. Download and view this video to get an inside look at Forrester Research's findings regarding DDoS and application attacks.
Posted: 07 Nov 2014 | Premiered: 30 Oct 2014

Akamai Technologies

Case Study: Improve Customer Experience with Managed Services
sponsored by Cisco & Fujitsu
VIDEO: Watch this brief video to learn about the managed services provider Mitchells & Butlers, a leading managed pub and pub restaurant operator, owning around 2,000 businesses offering food, drink and entertainment across the UK, partnered with to bring innovation to their business and help support a better guest experience.
Posted: 22 Oct 2014 | Premiered: 22 Aug 2013

Cisco & Fujitsu

Give Your Users What They Want with Cloud and Mobile
sponsored by IBM
WEBCAST: This informative webcast discusses how moving to the cloud can accelerate mobile adoption, as well as how to combine the power of cloud with the freedom and functionality of mobile.
Posted: 07 Oct 2014 | Premiered: Oct 7, 2014

IBM

Demo: RSA ECAT
sponsored by RSA
VIDEO: Watch this demo to see what real-time malware analysis on the endpoint looks like with RSA ECAT.
Posted: 28 Oct 2014 | Premiered: 28 Oct 2014

RSA

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

Secure Identity and Smart Employee ID Solutions
sponsored by HID
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

HID

Cloud Application Security Requires Visibility and Control
sponsored by CipherCloud
VIDEO: Tune in to this video to find out how to gain visibility and control over your cloud applications with an easy to deploy solution.
Posted: 23 Sep 2014 | Premiered: 23 Sep 2014

CipherCloud

Don't Let Legacy Infrastructure Be Your Legacy
sponsored by Red Hat
VIDEO: This whitepaper explains the advantages of using Linux to upgrade your legacy infrastructure, including more uptime and seamless app migration.
Posted: 17 Oct 2014 | Premiered: 23 May 2014

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement