IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

The Hiker's Guide to Software Security
sponsored by Synopsys
WHITE PAPER: Uncover 7 key considerations for building app security seamlessly into your software development and deployment initiatives.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Synopsys

The Transformational Power of Hyper-converged Infrastructure
sponsored by VMware & Intel
WHITE PAPER: Where data centers are concerned, infrastructure-centric thinking has evolved to more workload-centric thinking—which is where hyper-converged infrastructure enters the game. Download this paper to delve into HCI, which can deliver cost-effective capacity for a wide range of workloads, and more.
Posted: 07 Dec 2017 | Published: 31 Dec 2016

VMware & Intel

Security at Scale with Cloud Computing - A Minute in the Life of Google
sponsored by Google Cloud
WHITE PAPER: "No one in today's highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

TOPICS:  IT Management
Google Cloud

How to Gain IT Efficiencies with Automation
sponsored by VMware
WHITE PAPER: Every IT team has chores to do before they can have fun, time-consuming manual processes to take care of before they can focus on business innovations. Read this white paper to learn how to automate key processes.
Posted: 29 Nov 2017 | Published: 28 Feb 2017

VMware

Using Security Automation for Continuous Deployment Cycles in the Cloud
sponsored by CloudPassage
WHITE PAPER: Explore this article to uncover ways to advance and automate your cloud security to emphasize speed, flexibility and integration to keep up with the shift to the progressive DevOps practices.
Posted: 01 Dec 2017 | Published: 01 Dec 2017

CloudPassage

Forrester: How To Become A Superstar Security Leader
sponsored by Google Cloud
WHITE PAPER: As an IT leader your fellow executives trust you to protect, support, and drive business performance. However, expectations of IT security have changed with the increase of digital data. Download this Forrester report to read specific examples of how today's top information security professionals are rising to the occasion.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

TOPICS:  IT Management
Google Cloud

How to Handle a Ransom Driven DDoS Attack
sponsored by Corero Network Security
WHITE PAPER: Corero found that in the first quarter of 2017, their customers experienced an average of 4 DDoS attacks attempts per day. This step-by-step guide offers strategies to protecting against DDoS attacks and the rising ransom-driven DDoS attacks.
Posted: 27 Nov 2017 | Published: 27 Nov 2017

Corero Network Security

Software Development Patterns and Processes for Continuous Application Modernization
sponsored by Red Hat
WHITE PAPER: This white paper illustrates three specific software development patterns with which you can modernize existing apps. Read on to use these techniques to help establish a practice for continuous modernization, to extend the life of existing apps, and to determine when it is necessary to rewrite from scratch.
Posted: 30 Oct 2017 | Published: 31 Dec 2016

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement