IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

5 Myths Holding Your Security Program Back
sponsored by Digital Guardian
WHITE PAPER: This white paper explores the five common security myths that actually hinder data protection efforts.  View now to learn more.
Posted: 10 Apr 2015 | Published: 25 Feb 2015

Digital Guardian

Industry Insight: IT in the Retail Store
sponsored by StorMagic, Inc.
WHITE PAPER: This analysis lays out the challenges of retail store IT and suggestions for how to meet those challenges and enhance your retail stores' productivity.
Posted: 15 Apr 2015 | Published: 15 Apr 2015

StorMagic, Inc.

Cybersecurity Strategies for the Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper examines the steps and technologies security managers for small- to mid-size organizations can leverage at each stage of an attack - before, during and after - in order to effectively secure endpoints and crucial data effectively.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Cisco Systems, Inc.

Under Threat or Compromise Every Detail Counts
sponsored by Blue Coat Systems
WHITE PAPER: This white paper breaks down the five essential steps of security management to help you create a more comprehensive defense suited for today's threat landscape.
Posted: 08 Apr 2015 | Published: 31 Aug 2014

Blue Coat Systems

A Much Needed Cybersecurity Paradigm Shift
sponsored by UnitedLex
WHITE PAPER: This white paper explores why hackers have the upper hand in the battle for data and why organizations need to ramp up security measures, regardless of their current status. View now to gain insight into today's threat landscape.
Posted: 13 Apr 2015 | Published: 08 Oct 2014

UnitedLex

Securely Delivering 3D Graphics for Naval Training Simulator
sponsored by NVIDIA/VMware
WHITE PAPER: Naval ROTC training simulators require high-end 3D graphics. Learn how NCSU was able to virtualize it for easier access.
Posted: 08 Apr 2015 | Published: 06 Apr 2015

TOPICS:  IT Management

How New Tech and Customer Expectations Impact Analytics
sponsored by IBM
WHITE PAPER: Big data, mobile, cloud and client expectations are changing business. Learn how one analytics platform deals with them.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

TOPICS:  IT Management
IBM

Delivering 24/7 Access to NC State University Users
sponsored by NVIDIA/VMware
WHITE PAPER: NC State was dealing with more devices and users than ever. Learn how they boosted access with VDI and kept costs low.
Posted: 08 Apr 2015 | Published: 06 Apr 2015

TOPICS:  IT Management

Time for Legal and Compliance Staff to Tune in to Cyber Risk Management
sponsored by UnitedLex
WHITE PAPER: Access this white paper to learn why a unified or converged approach to threat management is necessary to effectively fight cyber attackers and prevent costly data breaches.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

UnitedLex
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement