IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

SAM and the Software Catalog
sponsored by Snow Software
WHITE PAPER: The following exclusive white paper will show readers how to establish and maintain a software catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose. View now to learn more, including SAM tools that can help automate many data collection and population tasks.
Posted: 13 Oct 2017 | Published: 31 Dec 2016

Snow Software

Multi-factor Authentication for dummies
sponsored by iovation, Inc.
WHITE PAPER: The combination of username and password is the most common form of authentication and is notorious for being cybersecurity's weakest link. Inside this 53-page e-book, Multi-factor Authentication for Dummies, gain insight on multi-factor authentication and how you can protect your enterprise from identity theft, data breaches, and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

iovation, Inc.

What You SIEM is What You Get
sponsored by AlienVault
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

A Risk Manager’s Guide to the General Data Protection Regulation (GDPR)
sponsored by BitSight
WHITE PAPER: Noncompliance with the GDPR will result in a maximum fine of €20,000,000 or 4% of an organization's worldwide revenue, whichever is greater. In this white paper, gain a deeper understanding of the GDPR, how it will affect your organization, and how you can prepare for it.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

BitSight

Threat Intelligence Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Next-Generation Anti-Malware Testing for Dummies
sponsored by Cylance
WHITE PAPER: Inside this Next-Generation Anti-Malware Testing for Dummies e-book, learn about next-generation endpoint security techniques and how you can use machine learning and AI to protect against advanced persistent threats.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Cylance

Learn How You can Simplify Mobile Security
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper outlines what one new mobile threat protection product "SandBlast Mobile" offers.
Posted: 19 Oct 2017 | Published: 13 Jul 2017

Check Point Software Technologies Ltd.

Build Your Own vs. Appliance – A Comparison of HCI Deployment
sponsored by StorMagic
WHITE PAPER: The best place to start the hyper-converged infrastructure buying processes is by clearly defining the goals you wish to achieve with your deployment. Explore this white paper to help outline these criteria. Then go through 6 things to consider before making the decision to build or buy.
Posted: 09 Nov 2017 | Published: 09 Nov 2017

StorMagic

Service Desk Success: An Opportunity for Differentiation
sponsored by MicroFocus
WHITE PAPER: Learn how to formulate an effective approach to service desk management that will assist you in differentiating your service offerings from your competitors. Read on to ensure resources are aligned with business requirements, line management achieves control over the change management process, and more.
Posted: 15 Nov 2017 | Published: 31 Dec 2016

MicroFocus
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement