IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Top 10 Purchasing Considerations for a Hyper-Converged Infrastructure
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this infographic, you will ensure you get the most of your hyper-converged infrastructure by discovering these top 10 purchasing considerations. Read on to evaluate potential vendors based on their ability to support mixed architectures, cover device outages, and more.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

Hewlett-Packard Enterprise

A New Approach to Discovery, Security and Compliance for Sensitive Unstructured Data
sponsored by DataGravity
WHITE PAPER: This white paper lays out a best-of-breed solution that is highly integrated providing comprehensive sets of features that solve large security problems.
Posted: 12 Feb 2016 | Published: 27 Jan 2016

DataGravity

Your Chief Data Officer: Re-imagining the Business of Data
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the emerging value of the chief data officer (CDO). Read on to learn how CDOs are mobilizing their organizations around an enterprise-wide data strategy, activating the use of data in new ways, and building more data-driven cultures.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

IBM

Encryption: Quickly Deploy Security Solutions
sponsored by Oracle Corporation
WHITE PAPER: Access this data sheet and learn ways to quickly deploy encryption and other security solutions by centrally managing encryption keys.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Oracle Corporation

Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner
sponsored by CA Technologies
WHITE PAPER: This guide highlights a secure, user-convenient and cost-effective way to protect consumer portals and mobile applications. Discover ways to silently and transparently collect data and assess risk based on factors like device ID and user behavior.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

CA Technologies

How Mobile Malware Compromises Your Secure Containers and Enterprise Content
sponsored by Kingpin Communications
WHITE PAPER: Mobile operating systems contain a large number of exploitable vulnerabilities related to access privileges. In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content, and discover how to detect suspicious mobile activity.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

Prevent Cybercriminals from Taking Down your Business
sponsored by Microsoft
WHITE PAPER: This infographic reveals what companies are doing right (and wrong) in their security initiatives, and what it's costing them. Uncover technologies that not only build bigger walls against attacks, but also lock criminals out altogether.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

Microsoft

Securing Your Network and Application Infrastructure: 24 Experts Share Their Secrets
sponsored by Fortinet, Inc.
WHITE PAPER: This collection of 24 essays, written by experts, covers five major security topics that are more relevant than ever, including: protecting the core of your network, staying ahead of hackers, and 3 more.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Website Security Threat Report
sponsored by Symantec Website Security
WHITE PAPER: By using data from the most comprehensive global intelligence network in the world, this resource provides a breakdown of each type of cyber-attack and how you can prevent it.
Posted: 10 Feb 2016 | Published: 30 Dec 2015

Symantec Website Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement