IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam Multimedia (View All Report Types)
Is Your High-Value Data Safe?
sponsored by Imation Corp.
WEBCAST: This webcast discusses how you can build security architecture that safeguards your data at every stage of the data lifecycle.
Posted: 04 Sep 2015 | Premiered: Aug 27, 2015

Imation Corp.

STW Group Securely Manages Its National Network
sponsored by Palo Alto Networks
WEBCAST: In this case study, Tom Ceglarek, Chief Information Officer at STW Group, examines how STW securely managed their explosive growth of video and applications across its national network. Learn how to employ next-generation firewalls with parallel code to take your security to the next level.
Posted: 16 Oct 2015 | Premiered: Oct 16, 2015

Palo Alto Networks

How to Develop Mobile Applications Using Windows 10
sponsored by Pluralsight
WEBCAST: To learn what else Windows 10 can do for mobile app developers, access this webinar, which outlines the development capabilities built into the Windows 10 upgrade. View now to access guiding principles to help you get started developing Windows apps today.
Posted: 03 Sep 2015 | Premiered: Sep 3, 2015


Privileged Access
sponsored by
VIRTUAL ENVIRONMENT: Learn how to implement effective logging and monitoring of privileged user accounts so a potential security incident involving privileged access can be quickly mitigated or avoided entirely.
Posted: 05 Nov 2015 | Premiered: 16 Oct 2015

Webcast: Putting Fault Tolerance to the Test - A Vendor Lab Review by Howard Marks
sponsored by Pivot3
WEBCAST: In this webinar, Howard Marks, Chief Scientist at, tests a three node enterprise HCI to see just how efficient and resilient systems using erasure coding are. View this webcast now to get an insider's look at this enterprise system's performance.
Posted: 09 Sep 2015 | Premiered: Sep 9, 2015


Is Data Less Secure in the Cloud: Fact or Myth?
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, Ramses Gallego, Security Strategist at Dell Software, highlights the questions that should be asked about the processes and people involved in enterprise data sharing and transfer. Click here to see why a cloud approach to data security may be the best strategy.
Posted: 25 Aug 2015 | Premiered: Aug 25, 2015

Dell, Inc.

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by WhiteHat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Podcast: Aventura & Brian Madden Talk Virtualization in Healthcare
sponsored by Aventura
PODCAST: In this podcast, independent analyst Brian Madden sits down with a leader in healthcare technology to discuss VDI and desktop virtualization. Listen now and find out how you can take context into consideration with each patient in virtualized care environments.
Posted: 15 Oct 2015 | Premiered: Oct 15, 2015


Why Innovation Matters: Discussing 8x8's Patents and Technologies
sponsored by 8x8, Inc.
VIDEO: Watch this informative webcast to hear executives from 8x8 reflect on their culture of innovation and discuss why it matters to customers and to the cloud communications industry. You'll find out how their patents and technologies have changed the business communications market.
Posted: 23 Nov 2015 | Premiered: 22 Jan 2015

8x8, Inc.

What if your App Virtualization Solution Didn't Include Image Deployment?
sponsored by Dell, Inc.
VIDEO: Watch this video to see Brian Madden deal with updating desktop servers which result in none of the updated computers having the same image deployment. Find out how application virtualization solutions that don't include image deployment can be an ambitious task for IT pros to handle.
Posted: 03 Sep 2015 | Premiered: 03 Sep 2015

Dell, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement