IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile SpamWhite Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Your Money or Your Life
sponsored by Webroot
WHITE PAPER: This whitepaper highlights a dangerous new form of malware called CrytoLocker, which holds personal information at ransom. The paper also explains how Webroot SecureAnywhere can help protect against this threat.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Webroot

Authentication Management: Ensuring Security for Remote Workers
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This guide explores one company's authorization management tool and how it can enable secure access to employees working from home or other off-site locations.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

RSA, The Security Division of EMC

Mobile Threat Report 2014
sponsored by Webroot
WHITE PAPER: The Webroot® Mobile Threat Report provides an overview of the risks and trends of the mobile space, based on research and analysis conducted by the Webroot Mobile Threat Research team.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Webroot

A Roadmap for Big Data in Security Analytics
sponsored by EMC Corporation
WHITE PAPER: Starting with a foundational set of data management and analytic capabilities enables organizations to effectively build and scale security management as the enterprise evolves to meet Big Data challenges.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

EMC Corporation

Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER: This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

VMware and IBM System x: An Innovative Foundation for Modern IT
sponsored by VMware and IBM
WHITE PAPER: This guide explores the benefits of joint solutions featuring IBM's System x portfolio and VMware's vSphere with Operations Management. These two companies collaborated to develop solutions that address the individual needs and plans of organizations when it comes to cloud environments.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

VMware and IBM

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Websense 2014 Threat Report, Websense Security Labs
sponsored by Websense
WHITE PAPER: In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

Websense

PPM: What's the ROI?
sponsored by CA Technologies.
WHITE PAPER: This informative white paper offers an in-depth look at the benefits and ROI of one PPM suite that combines project, resource, and financial management with comprehensive portfolio analysis and assessment. Read now to view an example business case, and discover the benefits this technology could offer you.
Posted: 15 Apr 2014 | Published: 31 Aug 2012

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement