IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

How Protecting Valuable IP Helps A Leading Automotive Supplier Drive Productivity
sponsored by Cisco Umbrella
WHITE PAPER: Learn how a major automotive group was able to preemptively secure their globally distributed network against potential threats, safeguarding 2,500 users and their valuable intellectual property.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Cisco Umbrella

The Internet Of Relevant Things: Achieving Strategic Goals By Bridging Business Objectives With IoT Context & Data
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The term Internet of Things (IoT) itself can be misleading, so it is important to consider one thing before going into a project: relevancy. Access this white paper to learn how to evaluate your IoT projects for business relevancy and better manage projects with secure networking without compromising usability.
Posted: 12 Jul 2017 | Published: 31 Dec 2016

Hewlett Packard Enterprise

How LepideAuditor Helps You Detect and Prevent Privilege Abuse
sponsored by Lepide Software
WHITE PAPER: Discover how to combat the issue of privilege abuse with in-depth auditing of changes taking place in critical servers and data. Find out how to identify privileged users, track permission changes continuously, clean out old, unused accounts, ensure least privilege, and more.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

Lepide Software

8 Best Practices to Ensure Compliance When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Mitigating the risk shadow IT poses to your company is essential to ensuring compliance when adopting cloud apps and services. Discover 8 best practices that can help you avoid remediation costs, compliance fines, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Symantec & Blue Coat Systems

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

HyperConvergence or Hyper-Security? What's Right for Your Enterprise?
sponsored by HyTrust
WHITE PAPER: To achieve cost-effective agility and scale, many organizations are moving to HyperConvergence Infrastructures (HCI). For data security, they are installing self-encrypting drives (SED). But there are security and compliance limitations. Learn why adding more SEDs may not make your enterprise secure and compliant.
Posted: 27 Jul 2017 | Published: 27 Jul 2017

HyTrust

IAM Case Study: How to Maximize Your ROI and Security
sponsored by OneLogin
WHITE PAPER: Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

Protect Your Enterprise From Ransomware With Intelligent Hybrid Cloud Storage
sponsored by Panzura
WHITE PAPER: As the ransomware threat grows, it's becoming increasingly obvious that traditional methods of protection aren't keeping our data safe. Read on to learn how adopting an intelligent hybrid cloud storage system could be the key to mounting a real defense against ransomware.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Panzura

The Argument for a New IT Security Architecture
sponsored by Citrix
WHITE PAPER: Disruptive technologies, cybercrime and compliance are creating risks enterprises have never encountered before. In this Ponemon Institute report, discover how to rethink your IT security framework to improve your security posture and reduce risk.
Posted: 11 Jul 2017 | Published: 31 May 2017

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement