IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam White Papers (View All Report Types)
 
Today's Mobile Enterprise: The Need for A New Network Security Strategy
sponsored by Aruba Networks
WHITE PAPER: Network security is failing to keep up with the rapid influx of mobile devices. Security professionals have realized that BYOD, mobility and cloud are exposing flaws in network security architectures. This vendor-neutral resource highlights how your enterprise can mitigate risk effectively in this type of dynamic environment.
Posted: 22 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Creating a Public Cloud Experience In-House
sponsored by Stratoscale
WHITE PAPER: Since the inception of cloud computing, business ITs have wanted to replicate the power of cloud computing within their own on site data centers. But, unlike net-new built cloud computing systems, enterprises can't rebuild their technology from scratch. Access this white paper to learn how to leverage the value of public clouds on-site and more.
Posted: 15 Jun 2016 | Published: 15 Jun 2016

Stratoscale

QRadar SIEM
sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM

Does Your Application Infrastructure Meet Modern Business User Needs?
sponsored by Citrix
WHITE PAPER: 72% of CEOs are concerned about keeping up with new technology. Learn how infrastructure management tools can enable accelerated application delivery, scalability, security, and streamlined management.
Posted: 24 Jun 2016 | Published: 29 Jan 2016

Citrix

Transform to an On-Demand, Hybrid IT Infrastructure
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover the outcomes hybrid IT will deliver to your digital business—and examine how, respectively, converged, software-defined, and hybrid-delivered infrastructure is set to improve speed, simplicity, and efficiency in your data center. Access now to ensure IT will meet dynamic app demands.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Hewlett Packard Enterprise

Expanding IT Automation Through Cross-Technology Software-Defined Networking Platforms
sponsored by Nuage Networks
WHITE PAPER: IT should deliver a variety of platforms that continuously evolve. Explore ways widespread adoption of virtualization and other technologies helps to integrate and streamline your infrastructure, so you can prepare for a digital future.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Nuage Networks

The Impact of Big Data, Mobile, Customer Expectations and Cloud on Analytics
sponsored by IBM
WHITE PAPER: Big data, mobility and cloud computing are all part of a major shift in analytics, forcing the need for a new approach. Read on to learn about today's requirements for business-critical analytics.
Posted: 16 Jun 2016 | Published: 27 Feb 2015

IBM

THE FIVE NEW RULES TO SECURE DYNAMIC DATA CENTERS AND CLOUDS
sponsored by Illumio
WHITE PAPER: The current security model for protecting applications in data centers and clouds is broken. We need an approach to security that protects from the inside out, and decouples security from the underlying infrastructure. Discover the 5 new rules to secure dynamic data centers and clouds in this white paper.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Illumio
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement