IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam Multimedia (View All Report Types)
Single-Source, Comprehensive Technical Support for Hardware Maintenance
sponsored by IBM
VIDEO: This video discusses how third party support can consolidate your hardware to a couple vendors that only need maintenance a few times a year. Watch now to discover how this service can streamline your maintenance needs with a single point of contact, allowing you to predict your hardware support requirements and weigh risks ahead of time.
Posted: 11 Nov 2015 | Premiered: 29 Sep 2014


Control Security for the Whole Enterprise with One Portal
sponsored by BitDefender
VIDEO: This video explains how employing a dedicated management portal for your endpoint security – whether physical, virtual or mobile – can help make your enterprise safer.
Posted: 07 Oct 2015 | Premiered: 19 Feb 2013


Is Data Less Secure in the Cloud: Fact or Myth?
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, Ramses Gallego, Security Strategist at Dell Software, highlights the questions that should be asked about the processes and people involved in enterprise data sharing and transfer. Click here to see why a cloud approach to data security may be the best strategy.
Posted: 25 Aug 2015 | Premiered: Aug 25, 2015

Dell, Inc.

An Innovative Approach to Encrypted Network Security
sponsored by Unisys
VIDEO: This video introduces a new kind of encryption that keeps data on your network and mobile devices more secure while allowing for simple endpoint management and access.
Posted: 30 Sep 2015 | Premiered: 11 Sep 2015


Mitigate Complexity, Reimagine IT
sponsored by SAP America, Inc.
WEBCAST: In the following webcast, Carl Dubler demonstrates five technologies that promote innovation in IT. Tune in to discover details about simple data models, the modern user experience, and more.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

SAP America, Inc.

Threat Intelligence Networks: The Next Generation
sponsored by Symantec Corporation
WEBCAST: This video discusses how information security architecture has shifted the focus of threat intelligence from reactive protection for individual threats to proactive risk management. Learn how you can build security into your infrastructure by utilizing an ecosystem of products that work together to minimize the risks of a data breach.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.

What if your App Virtualization Solution Didn't Include Image Deployment?
sponsored by Dell, Inc.
VIDEO: Watch this video to see Brian Madden deal with updating desktop servers which result in none of the updated computers having the same image deployment. Find out how application virtualization solutions that don't include image deployment can be an ambitious task for IT pros to handle.
Posted: 03 Sep 2015 | Premiered: 03 Sep 2015

Dell, Inc.

Critical Steps to Effective Breach Response
sponsored by FireEye
WEBCAST: This webcast discusses the core features of effective incident preparedness and response.
Posted: 30 Sep 2015 | Premiered: Sep 30, 2015


RockYou Customer Video
sponsored by Rackspace
WEBCAST: In this webcast, learn why RockYou decided to move their infrastructure to the cloud, and the business benefits they saw from doing so, including: increased uptime, quick and easy scalability, less pressure on internal IT, and more.
Posted: 18 Nov 2015 | Premiered: Jun 25, 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement