IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone SpamWhite Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

C&J Energy: Going Public and Outgrowing Its Infrastructure
sponsored by Alert Logic
WHITE PAPER: This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Taming Shadow IT
sponsored by BitGlass
WHITE PAPER: This white paper offers an in-depth guide book to IT security in regards to cloud computing and applications.
Posted: 21 Oct 2014 | Published: 21 Oct 2014


How to Get Started on the Path to Simple, Successful Cloud Solutions
sponsored by Cisco & Fujitsu
WHITE PAPER: Access this white paper to learn the key steps for cutting through the complexity of the cloud to build a sustainable IT landscape. You'll also learn the top concerns and challenges that enterprises are facing as they develop and implement their cloud strategies as well as top criteria for overcoming these complexities.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Cisco & Fujitsu

Delivering a Secure Foundation For the Cloud with Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: This technology overview details an operating system that can help you get past some common cloud concerns.
Posted: 08 Oct 2014 | Published: 10 Jul 2014

Red Hat

Under Siege From Web Threats:APAC Countries Respond In Patchwork and Tardy Fashion
sponsored by Akamai Technologies
WHITE PAPER: Access the following white report to examine some of the toughest security challenges facing organizations today including insight into how to avoid performance-robbing practices being used by far-too-many companies.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

How Resellers can become the Trusted Advisors
sponsored by Webroot
WHITE PAPER: While the specific issues Value Added Resellers face vary widely, there is one universal challenge that every reseller has to undertake—positioning itself as a trusted advisor to its customers. So in short, how do you do it? Read the following white paper to find out now.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Webroot

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

All the Unusual Suspects
sponsored by Software AG
WHITE PAPER: This exclusive whitepaper breaks down the who, what, where, when, and why of automated surveillance in the financial market.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Software AG

10 Steps to Mitigate a DDoS Attack in Real Time
sponsored by F5 Networks
WHITE PAPER: This brief resource details a 10-step process to stopping distributed denial of service (DDoS) attacks immediately and before critical damage can be made.
Posted: 22 Oct 2014 | Published: 15 Jan 2014

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement