IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Multimedia (View All Report Types)
 
Mitigate Complexity, Reimagine IT
sponsored by SAP America, Inc.
WEBCAST: In the following webcast, Carl Dubler demonstrates five technologies that promote innovation in IT. Tune in to discover details about simple data models, the modern user experience, and more.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

SAP America, Inc.

Micro-Segmentation with NSX – New Value for VCE
sponsored by VMware
WEBCAST: This video discusses deploying micro-segmentation inside of your virtual network.
Posted: 20 Aug 2015 | Premiered: Aug 20, 2015

VMware

You've Been Breached: How to Create an Effective Incident Response Plan
sponsored by Dell SecureWorks
VIDEO: In this video, a security expert discusses how you can develop an incident response plan that will ensure your organization isn't caught by surprise in a cyber-attack.
Posted: 09 Jul 2015 | Premiered: 09 Jul 2015

Dell SecureWorks

Cyber Risk Intelligence Tailored For Your Business
sponsored by SurfWatch Labs
VIDEO: This brief video explains how cyber intelligence can help your organization gain a stronger understanding of the cyber risks it faces.
Posted: 13 Jul 2015 | Premiered: 12 Sep 2014

SurfWatch Labs

How to Protect Your Data in Virtual Environments
sponsored by IBM
VIDEO: This video discusses how you can implement data backup that is designed for a virtual environment.
Posted: 09 Jul 2015 | Premiered: 08 Sep 2014

IBM

Case Study: The Security Needs of a Growing Cloud Company
sponsored by CrowdStrike
VIDEO: In this brief video, the chief security officer of Rackspace explains how he met the challenges of securing hundreds of thousands of cloud infrastructures.
Posted: 03 Aug 2015 | Premiered: 03 Aug 2015

CrowdStrike

Does the Cloud Fit into Hybrid Data Environments?
sponsored by Dell, Inc.
WEBCAST: In this webcast, Shawn Rogers, Chief Research Officer in the Information Management Group at Dell, examines an advanced data analytics solution that enterprises can leverage in the cloud for enhanced data learning. View now to see how you can merge your enterprise cloud with others.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015

Dell, Inc.

Matrix42 MyWorkspace: Easy for IT. Easy for Users.
sponsored by Matrix42
WEBCAST: This webcast invites users to explore the streamlining potential of a unified workspace portal. Learn how to enable simplified management and access to apps, corporate documents, devices, and more.
Posted: 11 Jun 2015 | Premiered: Jun 11, 2015

Matrix42

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
PODCAST: In this Podcast, you'll find firsthand accounts of the tactics used by cybercriminals from none other than Don Smith, Technology Director for a leader in information security systems. Heighten your awareness of spear phishing and other common attacks that lead to security breaches.
Posted: 10 Jul 2015 | Premiered: Jul 10, 2015

Dell SecureWorks

Ensuring Security and Compliance in Today's Threat Landscape
sponsored by Splunk
VIDEO: In this video, an expert in security technology discusses what makes a piece of security software effective in today's threat landscape.
Posted: 20 Aug 2015 | Premiered: 19 Jan 2014

Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement