IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Spam Multimedia (View All Report Types)
 
Watson in TSS
sponsored by IBM
VIDEO: This webcast offers information about a solution that harnesses cognitive computing to assist with customer support. It diagnoses service requests to identify the best resolution almost instantaneously. Access this webcast now to see some of the client benefits this system has to offer.
Posted: 15 Dec 2016 | Premiered: 01 Nov 2016

IBM

Keeping Up with the Evolution of Security Operations Centers
sponsored by McAfee, Inc.
WEBCAST: Your security operations center (SOC) is the backbone of what keeps both your data and your network safe with a centralized and consolidated cybersecurity incident prevention, detection and response capabilities. In this webcast, learn the pitfalls of a weak SOC, as well as how SOC infrastructure has changed and improved in recent years.
Posted: 19 Apr 2017 | Premiered: Apr 19, 2017, 01:13 EDT (05:13 GMT)

McAfee, Inc.

Ansible Tower 3: An Introductory Look
sponsored by Red Hat
VIDEO: Give your team the power to scale: Learn how to manage complex, multi-tier application deployments and trouble-shooting with an IT automation framework. View now to end repetitive tasks, speed productivity, and scale IT initiatives by centralizing control of your infrastructure.
Posted: 12 Jan 2017 | Premiered: 20 Jul 2016

Red Hat

Ask The Analyst: Key Elements of an Effective Security Program
sponsored by AlienVault
WEBCAST: In this webcast, join Barbara Call of IDG and Forrester Security Analyst Joseph Blankenship to learn how organizations should assess their security intelligence program, validate the effectiveness of security monitoring tools, and plan for the future.
Posted: 12 Oct 2016 | Premiered: Jun 28, 2016

AlienVault

Splunk for DevOps Blogs
sponsored by Splunk
WEBCAST: Visit Splunk's DevOps Blogs page to review strategies and tips for improving your DevOps ecosystem.
Posted: 19 Oct 2016 | Premiered: Oct 19, 2016

TOPICS:  IT Management
Splunk

Minimize Risk and Strengthen Compliance in Data Exchange
sponsored by IBM
WEBCAST: Are your files secured and reliable? Overcome security and compliance concerns with managed file transfer technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Ten Questions to Ask Your File Gateway Vendor
sponsored by IBM
WEBCAST: Determine if a vendor will increase reliability, reduce security risk, and support rapid growth with these 10 questions.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

How Shipping Tech Firm Delivers Performance to Customers
sponsored by NetApp SolidFire
VIDEO: All-flash storage drives growth, protects customer data and meets customer needs at a U.S. postal partner.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp SolidFire

How High-Performance Storage Drives Competitive Advantage
sponsored by NetApp SolidFire
VIDEO: A managed backup provider describes how its solution lets it scale linearly and segment clouds the way it wants to.
Posted: 01 Nov 2016 | Premiered: 01 Nov 2016

TOPICS:  IT Management
NetApp SolidFire

HPE Services for Office 365 Drive Digital Collaboration
sponsored by Hewlett-Packard Enterprise
VIDEO: HPE's expertise combined with Office 365 offers a single, cloud-based solution with end-to-end accountability.
Posted: 17 Oct 2016 | Premiered: 17 Oct 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement