IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Absolute Persistence
sponsored by Absolute
WHITE PAPER: Technology never waits, and in the past 20 years we've seen plenty of change. Gone are the days when IT could support the business with one make of PC and a phone. Explore this white paper to discover how to secure and manage endpoints so your organization is protected, business data is secured, and end user productivity is supported.
Posted: 25 Oct 2017 | Published: 25 Oct 2017

Absolute

Amazon Web Services: Risk and Compliance
sponsored by Amazon Web Services
WHITE PAPER: Key into this white paper to explore a basic approach to evaluating AWS controls as well as AWS-specific information around general cloud computing compliance questions.
Posted: 11 Oct 2017 | Published: 31 May 2017

Amazon Web Services

The Complete Guide to Building a Security Culture
sponsored by Trustwave
WHITE PAPER: IT is driving fundamental changes in the way organizations operate, compete, and engage with customers and partners. In this guide, uncover 6 chapters to help you build out a stronger security culture. You'll identify the security challenges you must confront and the reasons why you need to engage with colleagues across your enterprise.
Posted: 13 Nov 2017 | Published: 13 Nov 2017

Trustwave

5 Things to Consider When Comparing Costs for Composable Infrastructure versus Traditional IT
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Composable infrastructure delivers where traditional IT cannot, but is it worth the investment? This Frost & Sullivan report covers five cost and value considerations that will reshape the way you think about composable infrastructure versus traditional IT.
Posted: 23 Oct 2017 | Published: 30 Sep 2016

Hewlett Packard Enterprise

European Businesses: You have a BYOD programme whether you like it or not
sponsored by Lookout
WHITE PAPER: 18% of federal employees with smartphones report encountering malicious software or malware. This white paper reveals how to secure your mobile devices from malware and protect your business as a whole from data loss.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

Build Your Own vs. Appliance – A Comparison of HCI Deployment
sponsored by StorMagic
WHITE PAPER: The best place to start the hyper-converged infrastructure buying processes is by clearly defining the goals you wish to achieve with your deployment. Explore this white paper to help outline these criteria. Then go through 6 things to consider before making the decision to build or buy.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

StorMagic

The State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: According to Larry Ponemon of the Ponemon Institute, 67% of enterprises are unable to detect employee use of insecure mobile devices. This white paper aims to answer some of the top questions security and IT operations executives face in regard to endpoint security, mobile security, and overall protection of your enterprise.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Absolute

Inside Online Carding Courses Designed for Cybercriminals
sponsored by Digital Shadows
WHITE PAPER: Experts project a loss of $24 billion to payment card fraud by the end of 2018. This paper looks at an online course designed for bad actors in order to shed light on the latest fraud tactics and tools, allowing consumers, merchants and credit card companies to better understand the threat and protect themselves from becoming the next fraud victim.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

Digital Shadows

DevOps Best Practices in Release and Deployment Management
sponsored by MicroFocus
WHITE PAPER: Explore DevOps best practices for transforming release and deployment management. Find out how to break down the walls between your IT and development teams, and uncover tips on how to optimize your use of automation, integrate your deployment/delivery toolchain, and more.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

MicroFocus
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement