IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone SpamMultimedia (View All Report Types)
 
Gaining a 30,000 Foot View Into Your Portfolio: Insights Into Portfolio Management from Air Traffic Control
sponsored by Innotas
WEBCAST: View this on-demand webinar, featuring Mark Mullaly, President of Interthink Consulting and author of PM.com's "Project Management in Practice" column, to learn what it takes to successfully implement a portfolio management solution, and how a different perspective could be your biggest asset.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Innotas

Top 10 Strategic Technologies Trends for 2014
sponsored by Gartner
WEBCAST: Watch this Gartner presentation recorded live at Gartner Symposium/ITxpo to learn about 2014 industry trends, and how you, as a CIO or IT manager, can take advantage and leverage these trends to revolutionize your operation and organization as a whole. Tune in now to learn more.
Posted: 03 Jul 2014 | Premiered: Jul 3, 2014, 01:01 EDT (05:01 GMT)

Gartner

Move from Chaos to Control: Creating a Mature File Transfer Process
sponsored by IBM
WEBCAST: When it comes to moving files between people, business, and other processes a majority of organizations are struggling.  This webcast will show you how to defeat your file transfer demons.
Posted: 20 Aug 2014 | Premiered: Aug 20, 2014

IBM

Webcast: Security Threat Intelligence
sponsored by CDW Corporation
WEBCAST: This web seminar provides an overview of the current malware landscape, including a discussion of the impact that data breaches have on businesses today.
Posted: 18 Jul 2014 | Premiered: Apr 30, 2014

CDW Corporation

Is Your Data Center Ready for Today’s DDoS Threats?
sponsored by Fortinet, Inc.
VIDEO: This webinar gives a description of distributed denial-of-services attacks and explains the benefits of a DDoS mitigation solution.
Posted: 30 Jul 2014 | Premiered: 17 Apr 2014

Fortinet, Inc.

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Score & Prioritize: Strategically Plan Your Portfolio with Ease
sponsored by Innotas
WEBCAST: In this webinar, you'll discover why implementing a scoring and prioritization process is not only easy, but can bring significant benefits, while moving your organization towards strategic alignment with the business.
Posted: 12 Aug 2014 | Premiered: May 15, 2014

Innotas

Applied Analytics — Turning Data into Answers
sponsored by Virtual Instruments
VIDEO: Watch this informative video now to find out how one industry-leading tool utilizes analytics to turn data into answers – all in real-time.
Posted: 10 Jun 2014 | Premiered: 10 Jun 2014

Virtual Instruments

Cloud Breaks IT: How a Broker Platform Can Help IT Harness the Power of Cloud
sponsored by Gravitant
WEBCAST: This exclusive webcast details how the cloud is not as easy, fast and cheap as people assume and offers cloud service brokerage as an important tool.
Posted: 18 Jul 2014 | Premiered: Jul 18, 2014

Gravitant

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement