IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile SpamWhite Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

The Enemy Within: The Changing Face of Threats to Information Security
sponsored by Clearswift
WHITE PAPER: This white paper discusses the danger that insider threats present to your enterprise, as well as strategies for protecting your company's critical information.
Posted: 21 Oct 2014 | Published: 17 Oct 2014

Clearswift

Solution brief: IBM MQ: the messaging solution for virtually all industries
sponsored by IBM
WHITE PAPER: This white paper examines a new messaging platform that delivers universal messaging backbone for virtually all industries to connect all systems and devices. Read on to learn how you can enable simpler, faster, more reliable and security-rich data exchange to fuel innovation and drive business growth.
Posted: 10 Oct 2014 | Published: 30 Apr 2014

IBM

How Can You Ensure Stability and Reliability?
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Enterprise Linux can provide the stable and proven enterprise platform you need to bring new levels of simplicity to your IT operations while ensuring your underlying infrastructure is completely secure.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Red Hat

Taming Shadow IT
sponsored by BitGlass
WHITE PAPER: This white paper offers an in-depth guide book to IT security in regards to cloud computing and applications.
Posted: 21 Oct 2014 | Published: 21 Oct 2014


Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Time for a New Coloracation Provider? 5 Ways to Know for Sure
sponsored by Iron Mountain
WHITE PAPER: Your data center colocation choices are of the utmost importance. The wrong choice can put you at risk of downtime, exceeding capacity, unsuccessful disaster recovery, or regulatory noncompliance. Access this resource to learn the 5 ways to know if it's time to search for a new colocation provider.
Posted: 21 Oct 2014 | Published: 20 Oct 2014

Iron Mountain

Journey to IT-as-a-Service Powered by Software-Defined Data Centers: An Executive Summary
sponsored by VMware, Inc.
WHITE PAPER: Business demands today are 24/7. This exclusive whitepaper explores the role IT-as-a-Service can play in meeting these demands.
Posted: 08 Oct 2014 | Published: 12 Sep 2013

VMware, Inc.

Delivering a Secure Foundation For the Cloud with Red Hat Enterprise Linux
sponsored by Red Hat
WHITE PAPER: This technology overview details an operating system that can help you get past some common cloud concerns.
Posted: 08 Oct 2014 | Published: 10 Jul 2014

Red Hat

Journey to the Hybrid Cloud
sponsored by VMware
WHITE PAPER: Access this whitepaper for insight into the hybrid cloud service provider landscape and key considerations for choosing a provider. Additionally, find out more about how hybrid cloud implementations enable many capabilities and business benefits.
Posted: 20 Oct 2014 | Published: 30 Sep 2014

VMware
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement