IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed    Add to Google    Add to My Yahoo!
SMS Spam Multimedia (View All Report Types)
 
Workload Automation SaaS to the rescue
sponsored by IBM
VIDEO: This video explains how workload automation can help automate both simple and complex business processes.
Posted: 04 Feb 2015 | Premiered: 07 Aug 2014

IBM

The New Rules of Data Security: Best Practices to Secure Data and Ensure Compliance
sponsored by IBM
VIRTUAL ENVIRONMENT: This virtual environment contains 4 informative webcasts discussing the new rules of data security.
Posted: 09 Feb 2015 | Premiered: 29 Jan 2015

IBM

Trial Download: InfoSphere Guardium Vulnerability Evaluation Edition
sponsored by IBM
SOFTWARE DEMO: This resource provides a free trial of a leading vulnerability assessment platform that you can set up easily and use to explore the benefits of database vulnerability assessment without the overhead of an enterprise deployment.
Posted: 02 Feb 2015 | Premiered: 02 Feb 2015

IBM

Using SCCD to Resolve an Issue
sponsored by IBM
VIDEO: This video examines how a held desk agent can use SmartCloud Control Desk to resolve an incident. View now to get a step-by-step breakdown of this process.
Posted: 23 Feb 2015 | Premiered: 07 May 2014

IBM

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Case Study: Improve Customer Experience with Managed Services
sponsored by Cisco & Fujitsu
VIDEO: Watch this brief video to learn about the managed services provider Mitchells & Butlers, a leading managed pub and pub restaurant operator, owning around 2,000 businesses offering food, drink and entertainment across the UK, partnered with to bring innovation to their business and help support a better guest experience.
Posted: 22 Oct 2014 | Premiered: 22 Aug 2013

Cisco & Fujitsu

Office 365 Security: Everything You Need to Know
sponsored by SecureAuth
WEBCAST: This webcast reveals how to secure Office 365 efficiently and maintain authentication strategies.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

Thrive, Survive or Perish - How the New Style of IT Changes Service Delivery
sponsored by Hewlett-Packard Company
VIDEO: View this webcast to learn about the new style of IT and how you can provide improved service delivery. Discover a converged console solution that automates every day maintenance tasks to liberate your admins to pursue innovative and transformative projects.
Posted: 08 Dec 2014 | Premiered: 05 Nov 2014

Hewlett-Packard Company

Overcoming the Challenges of Internal API Programs
sponsored by IntelĀ® Services
WEBCAST: Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014

IntelĀ® Services
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement