IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone SpamWhite Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Mobile Security: Threats and Countermeasures
sponsored by MobileIron
WHITE PAPER: Mobile devices are quickly becoming the device of choice for the primary end-user. The intuitive user-experience, robust computing capabilities, extensive catalog of apps, and always-on connectivity combined with portability make mobile devices very compelling PC replacements.
Posted: 22 Aug 2014 | Published: 22 Aug 2014

MobileIron

The Cloud: 5 Things Every Enterprise Must Consider
sponsored by Egenera
WHITE PAPER: This white paper provides five things for enterprises to consider when shopping for a cloud provider. Also, while you read, you'll learn about the new cloud landscape – the public cloud that specializes in numerous services.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Egenera

Advanced Security Threats: Are You Prepared?
sponsored by Symantec Corporation
WHITE PAPER: In this RSA survey, learn which IT areas are still a security challenge, and what industry leaders recommend.
Posted: 22 Aug 2014 | Published: 28 Feb 2014

Symantec Corporation

Ushering in a New Era in Mobile Data Security
sponsored by Bluebox
WHITE PAPER: In this informative white paper, discover a new mobile security platform that balances effective protection, data visibility, and app accessibility and freedom for the user.
Posted: 18 Aug 2014 | Published: 20 Aug 2014

Bluebox

The New Breed of DDoS Attacks: An Executive Brief
sponsored by Juniper Networks, Inc.
WHITE PAPER: This informative resource breaks down the new breed of DDoS attacks, and provides strategies for keeping your organization protected.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Juniper Networks, Inc.

Understaffed And At Risk: Today’s IT Security Department
sponsored by HP and Intel
WHITE PAPER: This Ponemon study explores how organizations can most effectively hire and retain expert security staff in order to help achieve business goals.
Posted: 22 Aug 2014 | Published: 28 Feb 2014

HP and Intel

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: This in-depth whitepaper outlines a log management solution which can eliminate many of the complexities of information security while maintaining the integrity of computing resources.
Posted: 07 Aug 2014 | Published: 31 Dec 2012

IBM

An IT Auditor’s Guide to Security Controls & Risk Compliance
sponsored by Bit9 + Carbon Black
WHITE PAPER: This resource highlights how to create Compliance Control Policies and 6 controls for managing regulated systems.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

Bit9 + Carbon Black

Management Tool that Empower IT with a Proactive Approach
sponsored by VMware
WHITE PAPER: This resource presents the results from a recent study interviewing 200 of your peers on the impact that VMware's vCenter Operations Management Suite had on their business.
Posted: 12 Aug 2014 | Published: 13 Sep 2012

VMware
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement