IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Infographic: What is Malvertising?
sponsored by Malwarebytes Corporation
WHITE PAPER: In this infographic, learn all you need to know about malvertising and how to stop it.
Posted: 06 May 2015 | Published: 06 May 2015


An Inside View of a Zero-Day Campaign
sponsored by Malwarebytes Corporation
WHITE PAPER: This white paper follows one real-life zero-day attack, detailing how the attack entered the network, what parts of the network it infiltrated, and how it was eventually mitigated.
Posted: 06 May 2015 | Published: 06 May 2015


SMS: A New Approach to Two Factor Authentication
sponsored by Nexmo
WHITE PAPER: This white paper explores how to secure enterprise data and sensitive information on mobile devices by using two factor authentication (2FA). View now to learn the 15 best practices to implementing a 2FA strategy and ensuring security success.
Posted: 22 Apr 2015 | Published: 21 Jan 2015

Nexmo

Newest Data Center Dilemma: Security vs. Performance
sponsored by BitDefender
WHITE PAPER: This white paper elaborates on the security concerns of virtualized environments and why traditional security approaches don't work.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender

Why Activity Monitoring Should Supplement Log Management
sponsored by BalaBit
WHITE PAPER: In this white paper, discover how you can fill in your log management gaps by monitoring privileged users.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

BalaBit

Cybersecurity Trends of 2015: A View from the Front Lines
sponsored by FireEye
WHITE PAPER: In today's dangerous threat landscape, the only way to stay secure is to know what you're up against. In this cybersecurity report, find essential information on today's latest security trends.
Posted: 04 May 2015 | Published: 31 Dec 2014

FireEye

Does Android Dream of Enterprise Adoption?
sponsored by IBM
WHITE PAPER: This white paper explains how you can protect yourself from common Android security holes with the proper MDM platform so that you can take advantage of the employee productivity benefits. If you're nervous about user management, data consumption, rooting and other issues, then this is the resource for you.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Research Report: The Benefits of Security Analytics
sponsored by Prelert
WHITE PAPER: Read this report to discover what IT pros have to say about security analytics' most useful features, its value, and more.
Posted: 05 May 2015 | Published: 30 Apr 2015

Prelert

Securing the Virtual Infrastructure without Impacting Performance
sponsored by BitDefender
WHITE PAPER: This white paper discusses some of the most common security pitfalls found in virtualized environments and suggests ways to avoid them.
Posted: 27 Apr 2015 | Published: 31 Dec 2014

BitDefender
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement