IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam White Papers (View All Report Types)
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

How to Measure Your IT Department for Better Service Delivery
sponsored by Global Knowledge
WHITE PAPER: From resource availability to necessary improvements, measurements are the key to successfully understanding how your organization is performing. This paper will give you guidance on why measuring is important, how to get started, what types of metrics are available, what should be measured, and how to go about initiating improvements.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Global Knowledge

Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Check Point Software Technologies Ltd.

How Boston Properties Stays One Step Ahead of Advanced Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this case study to discover how Boston Properties, a real estate company, found a security tool that could catch any cybersecurity threat, even unknown ones.
Posted: 12 Nov 2015 | Published: 12 Nov 2015

Check Point Software Technologies Ltd.

Protect Your Intellectual Property and Customer Data From Theft and Abuse
sponsored by TITUS
WHITE PAPER: This Forrester report shows you how to take an effective and holistic approach to data security in today's challenging environment.
Posted: 13 Nov 2015 | Published: 10 Jul 2015


TCO and the Cloud: Calculating The Benefits and Risks
sponsored by 8x8, Inc.
WHITE PAPER: This white paper debunks the myth that cloud is more expensive than traditional premise-based systems, and explains that TCO studies fail to value key strengths of cloud-delivered services. Learn how to compare costs with the extent of cloud benefits in mind.
Posted: 24 Nov 2015 | Published: 31 Oct 2015

8x8, Inc.

Put a Stop to Sophisticated DDoS Attacks
sponsored by Akamai
WHITE PAPER: This white paper discusses how you can prevent DDoS attacks and keep your organization's online presence secure and available.
Posted: 19 Nov 2015 | Published: 31 Dec 2014


SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why
Posted: 23 Nov 2015 | Published: 31 Oct 2015

Hewlett Packard Enterprise

Dow Corning Uses Classifications Labels to Help Protect Intellectual Property
sponsored by TITUS
WHITE PAPER: This short case study shows how one multinational company deployed an enterprise-wide classification management system which had the power to easily control document access.
Posted: 16 Nov 2015 | Published: 16 Nov 2015


Simplify migration to Hyper-V and Microsoft System Center
sponsored by Vision Solutions
WHITE PAPER: Access this white paper to find out how you can make the migration to Hyper-V and Microsoft Systems Center easy and affordable by reducing downtime and complexity.
Posted: 16 Nov 2015 | Published: 31 Dec 2014

Vision Solutions
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement