IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam White Papers (View All Report Types)
 
Today's Mobile Enterprise: The Need for A New Network Security Strategy
sponsored by Aruba Networks
WHITE PAPER: Network security is failing to keep up with the rapid influx of mobile devices. Security professionals have realized that BYOD, mobility and cloud are exposing flaws in network security architectures. This vendor-neutral resource highlights how your enterprise can mitigate risk effectively in this type of dynamic environment.
Posted: 22 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software

Cloud 401: Navigating Advanced Topics in Cloud Computing
sponsored by CDW
WHITE PAPER: Thus far, IT pros-turned-cloud-proponents have yet to source a guide that's comprehensive enough to span cloud advancements. Discover in this research report how to effectively navigate advanced topics in cloud computing, and learn the essential role your IT plays in cloud integration.
Posted: 11 May 2016 | Published: 31 Dec 2015

CDW

Mobilize Your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Where Network Virtualization Fits Into Data Center Initiatives
sponsored by VMware
WHITE PAPER: Network virtualization is what is going to enable you to keep up with the constant advances in technology without having to sweat over too many details. See how it fits into your existing physical network, your plans for software-defined data center and much more.
Posted: 16 May 2016 | Published: 29 Jan 2016

VMware

Advance Enterprise Analytics with Self-Service and Governance
sponsored by Pyramid Analytics
WHITE PAPER: Self-service BI can help business users quickly create data models and enable better decision-making, but this can't be achieved without centralized, managed security. Discover a highly scalable BI platform that can balance self-service BI with complete governance.
Posted: 19 May 2016 | Published: 19 May 2016

Pyramid Analytics

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is critical as these devices can create vulnerabilities in network security. Two major technology institutions are determining MDM requirements for government agencies. Read on for a breakdown of the best MDM practices.
Posted: 20 May 2016 | Published: 30 Dec 2015

IBM MaaS360

Evaluating Your Application Portfolio: 5 Key Steps
sponsored by CAST Software
WHITE PAPER: As your company grows, how can you decide which applications to keep, merge, or retire? This resource reveals 5 key steps to evaluate your application portfolio. Discover how you can mitigate software risks, reduce maintenance costs, optimize agility for resource allocation, and more.
Posted: 11 May 2016 | Published: 11 May 2016

CAST Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement