IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam Multimedia (View All Report Types)
 
Intelligent Threat Response and Risk Reduction for Today's Mobile Workplace
sponsored by Aruba Networks
WEBCAST: Mobile security is a crisis waiting to happen; and once the security event occurs it's hard to get things back under control. Join experts Kevin Beaver, Trent Fierro, and Jamie Chiu as they dive into how to tackle intelligent threat protection for a modern, mobile user network
Posted: 07 Jul 2017 | Premiered: Jun 21, 2017

Aruba Networks

Use AWS to Secure Your DevOps Pipeline Like a Bank
sponsored by Stelligent
VIDEO: From security of the source code used to trigger builds, to the insertion of strict business controls at run time, and out to the continuous inspection of the running infrastructure to ensure compliance, this webcast teaches you how to build capabilities that are enabling them to run their business faster and safer on AWS.
Posted: 21 Aug 2017 | Premiered: 29 Nov 2016

Stelligent

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Do You Effectively Manage Complex Data Transformation?
sponsored by IBM
VIDEO: Discover how to manage transformation with a single solution as data flows through the enterprise.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017

TOPICS:  IT Management
IBM

Magic Quadrant for Data Center Backup and Recovery Software
sponsored by IBM
WEBCAST: Discover the strengths and cautions for the vendors in the Data Center Backup and Recovery Software Magic Quadrant.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

Advantage Cloud: A Clear Path to Modernizing B2B Integration
sponsored by IBM
WEBCAST: Many rely on outdated, manual systems to exchange critical data. Learn how to reshape B2B integration with the cloud.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Meeting Your Banking Needs
sponsored by Hewlett-Packard Enterprise
VIDEO: Find out how to deliver a better, digital customer experience without increasing costs or replacing your legacy systems.
Posted: 08 Feb 2017 | Premiered: 08 Feb 2017

TOPICS:  IT Management
Hewlett-Packard Enterprise

The Importance of B2B Integration
sponsored by IBM
VIDEOCAST: IDC analyst Chandana Gopal explains why the LOB is critical in helping create a modernized B2B architecture.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement