IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam Multimedia (View All Report Types)
 
How Box Platform Helps Businesses Build Better Apps
sponsored by Box
WEBCAST: Discover how to build better apps that ease secure content sharing within and outside of your enterprise. Tune in to overcome cumbersome content sharing, and discover how content Platform-as-a-Service can transform your organization—from outside users to IT.
Posted: 16 May 2016 | Premiered: May 16, 2016

Box

How Del Monte Quickly Replaced Their IT Infrastructure
sponsored by Hewlett-Packard Enterprise
VIDEO: Discover how the food company Del Monte was able to create a new hybrid infrastructure within an 8-month time period. Learn how this strategy enabled them to quickly deploy solutions and stay one step ahead of the competition.
Posted: 11 May 2016 | Premiered: 02 Nov 2015

Hewlett-Packard Enterprise

Cloudmark Trident: Stop Spear Phishing in its Tracks
sponsored by Cloudmark
VIDEO: 91% of the millions of cyber attacks launched each day come from email. Is your email security prepared to handle sophisticated spear phishing attacks? In this video, explore how hackers successfully land attacks and how you can bolster your email defenses.
Posted: 21 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Why Digital Transformation Is Changing the Role of the Data Center
sponsored by Dimension Data
PODCAST: In this exclusive podcast, Brian Glick, Editor-in-Chief at Computer Weekly, reveals how affecting digital transformation in your enterprise will change the role of the data center. Listen now to ensure competitive longevity by modernizing your data center architectures with cloud-enabled, scalable technology deployment.
Posted: 28 Mar 2016 | Premiered: Mar 23, 2016

Dimension Data

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
WEBCAST: This webinar outlines how to protect your company from advanced threats and overcome common threat detection challenges that many organizations face. Tune in to learn about how you can protect your company from being the next headline in a data breach report.
Posted: 02 Feb 2016 | Premiered: Feb 2, 2016

Prelert

Deliver Secure Access to Cloud, Mobile, Windows Apps from Any Device
sponsored by VMware, Inc.
VIDEO: This brief video shows a single platform that integrates identity, application, and enterprise mobility management to securely deliver data and apps to any mobile device.
Posted: 26 Feb 2016 | Premiered: 09 Feb 2016

VMware, Inc.

Announcing VMware's Digital Workspace Vision
sponsored by VMware, Inc.
VIDEO: In this video, VMware's Sumit Dhawan, SVP & GM of End-User Computing Desktop Products, discusses the latest digital workspace platform from VMware that simplifies the consumer experience while ensuring enterprise security. Watch now and you'll learn five new capabilities and discover how your organization can benefit from this platform.
Posted: 26 Feb 2016 | Premiered: 09 Feb 2016

VMware, Inc.

Detecting Data Exfiltration
sponsored by LogRhythm, Inc.
VIDEO: Watch this webcast and learn how you can rapidly detect, respond and neutralize breaches in your networks before they cause serious damage.
Posted: 19 Jan 2016 | Premiered: 03 Aug 2015

LogRhythm, Inc.

New IT Technologies Transform Traditional Business Models
sponsored by Hewlett-Packard Enterprise
VIDEO: Andrew Dare, Chief Technologist of Financial Services UK&I at Hewlett Packard Enterprise, examines the important role emerging technologies play in transforming traditional IT setups in financial institutions. Tune in to take a close look at how the card payment space is changing.
Posted: 21 Mar 2016 | Premiered: 12 Nov 2015

Hewlett-Packard Enterprise

CPU-level Sandboxing: Disrupt Threats, not Productivity
sponsored by Check Point Software Technologies Ltd.
VIDEO: In this video, you'll find different features that eliminate threats at the point of pre-infection. Tune in and uncover ways to provide a higher catch rate of threats and give your organization a new level of protection against attackers.
Posted: 23 Mar 2016 | Premiered: 19 Feb 2016

Check Point Software Technologies Ltd.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement