IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

How one Australian Company Built Efficiencies Around their All-Star Team
sponsored by ConnectWise
WHITE PAPER: This white paper describes how ConnectWise, a leading business management platform, enabled Australian-based IT solution provider PowerNET to create profitability through efficiency and make sales predictable.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

ConnectWise

Internet of Things
sponsored by Axway
WHITE PAPER: The Internet of Things can be very beneficial, but security and privacy are crucial. Since the devices in the Internet of Things rely on APIs to communicate, the management of these APIs is also crucial. Access this white paper key to learn how to enable the Internet of Things through efficient API management implemented with speed and security.
Posted: 19 Feb 2015 | Published: 24 Sep 2013

Axway

Forrester's Evaluation of Hosted Collaboration Service Providers
sponsored by NaviSite
WHITE PAPER: CIOs need to consider moving collaboration tools off-premises. Today, there is a burgeoning services sector that can deliver highly customized messaging, teaming, and real-time communication services for the enterprise. This report provides an overview of the market, giving CIOs a sense of the players, their capabilities, and their offerings.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

NaviSite

Top 5 data centre trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Access this white paper to explore what experts believe are the top trends to watch for data centers in 2015 and find out their expected impact on business.
Posted: 26 Feb 2015 | Published: 28 Nov 2014

Dimension Data

IBM X-Force Threat Intelligence Quarterly - 3Q 2014
sponsored by IBM
WHITE PAPER: This exclusive white paper takes a look at how Heartbleed impacted organizations around the world.
Posted: 20 Feb 2015 | Published: 31 Aug 2014

IBM

How to Develop Secure Mobile Apps With a Stellar User Experience
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights the importance of providing a better application experience, as well as how to secure the mobile application development and delivery process.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

CA Technologies.

Cloud Security in an Agile World
sponsored by Rackspace
WHITE PAPER: This white paper discusses securing cloud applications in an agile world.
Posted: 20 Feb 2015 | Published: 31 Dec 2014

Rackspace

Executive ViewPoint - Successfully Securing Applications in a Mobility-Focused World
sponsored by F5 Networks
WHITE PAPER: In this whitepaper, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

F5 Networks

7 Steps to Securing Healthcare Infrastructures Using a Cloud Security Plan
sponsored by NaviSite
WHITE PAPER: This resource outlines the 7 steps you need to follow in order to secure infrastructures using a cloud security plan. By adhering to the following seven-step plan, you can bank on a proven methodology for cost-effectively and securely leveraging cloud services.
Posted: 19 Feb 2015 | Published: 18 Feb 2015

NaviSite
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement