IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Trusted Identities: Solving Fraud in Banking
sponsored by HID
WHITE PAPER: One of the biggest challenges facing banks today is how to provide secure and trusted services while substantially improving customer experience. Take a closer look at this white paper to reveal a holistic multi-channel identity and access management platform that can offer a better user experience and a higher level of mutual trust.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID

How to Build a SOC with Limited Resources
sponsored by LogRhythm, Inc.
WHITE PAPER: Read this white paper to discover the knowledge needed to successfully build your own security operations center (SOC).
Posted: 15 Sep 2017 | Published: 15 Sep 2017

LogRhythm, Inc.

New Security Challenges Redefine Risk and Vulnerability
sponsored by Fortinet, Inc.
WHITE PAPER: Learn the latest areas of security in which IT pros should be honing their focus to keep pace with the ever-evolving threat landscape. For example, training the 70% of uncertified IT pros to protect IoT devices.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Fortinet, Inc.

Is Hyperconverged Infrastructure Cost-Competitive with the Cloud?
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this report, analysts investigate the assumption that cloud is the cheapest data center solution based on a TCO model comparing hyperconverged infrastructure and several comparable cloud solutions. What were the results? Download now for your hyperconverged vs. cloud TCO model comparison.
Posted: 12 Sep 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Moving at the Speed of Byte: Ushering the Era of the Digitally Enabled Financial Institution
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how to embrace a digital strategy that embeds digital innovations into the existing customer experience, brings customers and employees together on the same platform, and enables desired sales in cross-selling and upselling.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Citrix

Disrupt the Machine-to-Human Fight with a New Defender Lifecycle Model in Security Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn how Gigamon's security delivery platform combats breaches and cyberattacks by integrating machine learning, artificial intelligence (AI) and security workflow automation.
Posted: 20 Sep 2017 | Published: 31 Jul 2017

Gigamon

Five Risk Points To Avoid In Enterprise Security
sponsored by Microsoft
WHITE PAPER: Hackers have found sophisticated methods to breach the network undetected.In this white paper, guide yourself through the 5-step course to detect and prevent advance cyberattacks.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Microsoft

What iOS 11 Means to the Enterprise
sponsored by MobileIron
WHITE PAPER: Apple is pursuing a stronger foothold in the enterprise market with many new features and capabilities released in iOS 11. This paper will focus on three key enterprise upgrades and the role of enterprise mobility management (EMM) solutions in managing and deploying some of these new capabilities.
Posted: 30 Aug 2017 | Published: 30 Aug 2017

MobileIron

Security Orchestration and Micro-Segmentation for Public and Private Cloud
sponsored by Cloudvisory
WHITE PAPER: According to Gartner, misconfiguration and mistakes are the leading causes of operations incidents and successful security attacks. Explore this white paper to uncover a cloud security platform that can provide you with protection your organization lacks.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

Cloudvisory
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement