IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Streamline Authentication with Voice Biometrics to Improve Contact Center Customer Experiences
sponsored by NICE Systems, Inc
WHITE PAPER: Discover how voice biometrics (VB) streamlines your entire customer authentication system, improves contact center efficiency, enhances security for sensitive customer data, and creates better overall customer experiences.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

NICE Systems, Inc

Mac Endpoints Move Into The Enterprise - and Into The Crosshairs of Hackers
sponsored by Palo Alto Networks
WHITE PAPER: Mac computers used to be safe havens—impregnable bunkers—that attackers couldn't figure out how to get into...until now. The threat landscape for Macs is seeing rapid growth. Access this white paper to learn which method is working to prevent malware.
Posted: 17 Aug 2017 | Published: 03 Jul 2017

Palo Alto Networks

Automating Multi-Cloud Security and Compliance
sponsored by BMC
WHITE PAPER: Access this compact resource to ensure security, governance, and compliance across private and public cloud environments, with automated prioritization and remediation of the most critical vulnerabilities or compliance violations. Here's your chance to see multi-tier remediation and actionable threat response at work.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

BMC

Your 3 Step Cybersecurity Checklist
sponsored by Barkly
WHITE PAPER: IT security is a shifting landscape, and your policy needs to be ready to meet today's threats, as well as those that are still evolving. Find a 3-step checklist designed to help you craft a robust and adaptive security policy.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Barkly

Threat Research Report: The Anatomy Of A Ransomware Attack
sponsored by Exabeam
WHITE PAPER: This extensive research report explains ransomware behavior and how you can protect your network. Inside you will gain access to a ransomware cheat sheet and a glossary of security terms.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Exabeam

The Need for Rapid Security Investigation
sponsored by Splunk
WHITE PAPER: Often when an issue or unsuspected attack occurs, IT teams find out too late. Explore an analytics-driven approach to security that enables organizations to respond to incidents as soon as possible.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Splunk

Enable Visibility and Protection in the Cloud-Connected Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: How can you close visibility gaps in the cloud? Explore two cloud security strategies that can provide the visibility to help you block threats earlier, extend threat protection, and more.
Posted: 26 Jul 2017 | Published: 31 Jul 2017

Cisco Umbrella

A Buyer's Guide to Cloud Access Security Brokers
sponsored by Cisco Cloudlock
WHITE PAPER: Uncover a detailed examination of CASBs and 7 essential features to look for. Also learn about the current cloud threat landscape, 6 challenges to proxy-based CASB tools, and more.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

Cisco Cloudlock

8 KPI's every MSP Should Consider
sponsored by Nerdio
WHITE PAPER: Download this white paper to uncover the eight KPIs specifically helpful to MSPs looking to grow their business, as well as specific advice on how to improve these figures in your workflow.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Nerdio
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement