IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone SpamWhite Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Analysis of the 4 Acceptable PCI DSS Storage Methods
sponsored by Delego
WHITE PAPER: Continue on to this important whitepaper now to explore the pros and cons of the four acceptable storage methods as outlined by the PCI DSS.
Posted: 12 Dec 2014 | Published: 12 Dec 2013

Delego

Three Ways to Achieve Fast and Affordable IT in an Always-On World
sponsored by VMware
WHITE PAPER: This white paper explores a way to handle data center challenges head on. Read on to learn how one solution gives you 3 essential capabilities for the era of the always-on business: enhanced performance monitoring, optimized capacity utilization, and simplified data backup and replication.
Posted: 05 Dec 2014 | Published: 31 Aug 2014

VMware

Delivering Optimized Mission-Critical Workloads in Enterprise Datacenters Through Innovative Systems and Services
sponsored by Dell, Inc.
WHITE PAPER: This white paper examines the benefits of investing in solutions that can process, support, and manage mission-critical workloads for cloud solutions, mobility capabilities, and data analytics initiatives in today's data centers. Read on to learn about new systems and support needed to manage a modern data center infrastructure.
Posted: 18 Dec 2014 | Published: 31 Jul 2014

Dell, Inc.

Sleeping Through the Alarm: What Breaches Should be Telling Us, and Why the Message is Missed
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper reports the findings of an extensive SafeNet survey of security professionals around the world, offering insights into current market realities and their implications for security executives.
Posted: 12 Dec 2014 | Published: 11 Nov 2013

SafeNet, Inc.

Why Attack Intelligence Matters
sponsored by Core Security Technologies
WHITE PAPER: Continue on to this informative white paper to learn how attack intelligence can analyze your vulnerability data, security events, and configuration data to give you a concise view of the attack paths to your most critical data.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

CIO Spotlight: Controlling Data Risk In the BYOD Onslaught
sponsored by CommVault
WHITE PAPER: This exclusive paper lists 5 areas that support risk mitigation and data protection for BYOD. Read on to learn more.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

CommVault

The benefits of Cloud Computing: looking beyond cost savings
sponsored by Kaseya
WHITE PAPER: Access this e-guide to explore the future of cloud and learn how the benefits could be twofold for service providers, increasing IT spending and the value to IT shops.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

Kaseya

4 Reasons You Need a High Performance ADC
sponsored by A10 Networks
WHITE PAPER: This infographic points out 4 reasons why you need a high performance ADC for your business.
Posted: 05 Dec 2014 | Published: 01 Nov 2014

A10 Networks

Email Archives: Why Old Solutions Aren't Sufficient for Modern Enterprises
sponsored by Mimecast
WHITE PAPER: This white paper examines the difficulties that organizations encounter as they seek a solution to ever-increasing volumes of stored emails and the need for faster, more flexible accessibility to this data.
Posted: 19 Dec 2014 | Published: 31 May 2013

Mimecast
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement