IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Determine and Compare Hybrid Cloud TCO: Discovering Key Approaches
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Download now to discover 2 methods for determining and comparing hybrid cloud TCO. Learn how to select the right type of hybrid infrastructure that fits your unique requirements for where apps will be deployed across traditional IT, public, private, and managed cloud.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

Hewlett Packard Enterprise

How To Easily Start Your Implementation Planning for Office 365
sponsored by Blue Coat Systems
WHITE PAPER: Uncover how to effectively plan for your enterprise's adoption of Office 365, and run through a comprehensive step-by-step to build your cloud "to-do" list.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Blue Coat Systems

Windows 10, EMM, and the Future of PC Security and Management
sponsored by MobileIron
WHITE PAPER: This white paper examines how Windows 10, enterprise mobility management (EMM) platforms, and mobile devices are changing the way you can approach complicated security and management tasks. Uncover the top 5 PC management capabilities of EMM, key considerations in adopting an EMM platform, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

MobileIron

PCIO Special Report, "Enterprise Modernization"
sponsored by Pure Storage
WHITE PAPER: This research report examines how government agencies can modernize enterprise systems more quickly and will provide some examples of how it's being done. Most importantly, it will discuss best practices that show how iterative, agile IT development can take root and flourish in the public sector.
Posted: 20 Sep 2016 | Published: 01 Aug 2016

Pure Storage

Can Enterprises Hire Their Way Out of Cloud Security Risks?
sponsored by Palerra Inc.
WHITE PAPER: This white paper explores the essential question: Can enterprises hire their way out of cloud security risks? As more employees connect their personal devices to your cloud environment, the answer to this question becomes even more crucial. Discover what roles hiring and automation are playing in mitigating cloud security risks.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Palerra Inc.

Cloud Computing Security Considerations and Requirements
sponsored by Palo Alto Networks
WHITE PAPER: In an era where the cloud is considered nontraditional, securing it shouldn't be either. Learn how to segment your applications and data, centrally manage and automate security deployments, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

EAM Energy Performance: Extending the Asset Life
sponsored by Infor
WHITE PAPER: To stay competitive, you need to understand the energy behind asset management. Access this paper to extend the life of your assets with an energy performance management system that will increase your return on assets, improve visibility, allow continuous peak-demand analysis, and more.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

Infor

To Increase Downloads, First Instill Trust: Security Advantages of Code Signing
sponsored by Symantec
WHITE PAPER: Malware poses a serious threat to the mobile environment: malicious code can slip into app stores and become a threat to anyone who downloads them. Discover how code signing enables end users to take advantage of the ease and convenience of content distribution—without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 31 Dec 2014

Symantec
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement