IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone SpamWhite Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Implement a More Secure Network to Keep Up with Shadow IT
sponsored by Verizon
WHITE PAPER: This white paper examines the ramifications of the growth of shadow IT and examines how you can protect against potential issues. Read on to learn how you can implement a more secure network to keep up with evolving IT demands.
Posted: 12 Nov 2014 | Published: 31 Dec 2013

Verizon

How to Enable Secure Mobility & Improve Efficiency
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at how mobility is changing the way organizations do business. Read on to learn more.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Citrix

Providing Security for Software Systems in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper details risks to software deployed in the cloud and explores the steps that your organization can take to mitigate those risks.
Posted: 18 Nov 2014 | Published: 30 May 2014

Hewlett-Packard Company

4 Key User Virtualization Benefits for Financial Services
sponsored by AppSense
WHITE PAPER: Access this white paper to learn how user virtualization can transform the desktop into a user-centric, device independent model and explore four benefits seen by IT departments.
Posted: 19 Nov 2014 | Published: 30 Nov 2011

AppSense

Endpoint Management for Data Centers - Under the Hood of a Data center
sponsored by IBM
WHITE PAPER: Download this exclusive infographic to learn more about the current threat landscape and how you can improve security with effective endpoint management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

IBM

The Importance of Improving and Adapting Web Security
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores CSOs' opinions and strategies regarding web security; the challenges that currently stand in the way of web security deployment within many organizations; and the options that businesses have for working through these critical issues.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Akamai Technologies

Best Practices to Enable Mobility without Sacrificing Security
sponsored by Citrix
WHITE PAPER: This exclusive white paper can help you understand mobility and its best practices for healthcare and other large organizations. Read on to learn more.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

Citrix

Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

Data Center Projects - Commissioning
sponsored by Schneider Electric
WHITE PAPER: Explore this white paper to learn the finer details of commissioning and how your organization's data center benefits from it.
Posted: 12 Nov 2014 | Published: 01 Nov 2011

Schneider Electric
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement