IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

5 Useful IT Best Practices That You Can Easily Apply to Your Entire Business
sponsored by Requuest
WHITE PAPER: Discover 5 easy IT best practices that you can easily apply to make a difference in day-to-day business activities without any IT expertise. Plus, learn how these practices can also be applied on a larger scale throughout the rest of your business.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Requuest

7 Steps to Take Charge of Your Cloud Strategy
sponsored by Blue Coat Systems
WHITE PAPER: Discover 7 actions that IT departments can do to take back their organizations from shadow IT and ensure they are not leaving themselves vulnerable to attack. Access now to gain a blow-by-blow plan to take charge of your enterprise's cloud strategy and not let shadow IT slip through the cracks.
Posted: 08 Dec 2016 | Published: 08 Dec 2016

Blue Coat Systems

Rising IT Complexity Makes Remote Support Essential in Europe
sponsored by LogMeIn, Inc.
WHITE PAPER: Growing end-user expectations and the increasingly complex IT landscape are creating new challenges and pushing IT support operations to adapt. This white paper analyses a solution that functions quickly and reliably, helping to reduce the time spent resolving individual support tickets by giving support staff ability to prepare support request.
Posted: 28 Nov 2016 | Published: 01 Oct 2016

LogMeIn, Inc.

Top 5 SIEM Challenges for the Midmarket
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Uncover the reasons why SIEM might not be the best fit for your mid-market company. Learn how it can under-deliver, fail to meet your needs, and how to find something that can.
Posted: 22 Nov 2016 | Published: 22 Nov 2016

Arctic Wolf Networks, Inc.

Four Countermeasures to Protect Against Ransomware
sponsored by Trend Micro
WHITE PAPER: Organizations must treat mitigating the risks associated with ransomware as strategic imperative. Learn about a prescriptive approach to do so based on 4 countermeasures curated by ESG, that align with the kill chain to effectively thwart these attacks.
Posted: 18 Nov 2016 | Published: 31 Aug 2016

Trend Micro

The Value of Data-Driven Automation to the ITSM Industry
sponsored by LogicNow
WHITE PAPER: In this expert white paper, explores how data-driven automation strategies are starting to change the course of global ITSM delivery, the return on this strategy, and how to figure out if this shift is suitable for your IT infrastructure.
Posted: 07 Dec 2016 | Published: 01 Nov 2016

LogicNow

Barbarians at the Gate - Shoring Up Web Application Defenses with Client Reputation
sponsored by Akamai
WHITE PAPER: Web application firewalls (WAFs) have become increasingly useful in mitigating cyberthreat risk to online assets for many companies. Learn how this and other cloud security approaches should be used in combination as part of your comprehensive defense strategy.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Akamai

State of the Internet Report Q3 2016
sponsored by Akamai
WHITE PAPER: This reports leverages cybersecurity data from around the world to show you how organizations fared against cyberattacks in Q3 2016. You'll learn statistics and see figures illustrating which industries were hit hardest and in what areas. Uncover what you should do in the year ahead to protect your enterprise.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Akamai

Defense-In-Depth with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: Deployed at strategic points, internal segmentation firewalls (ISFWs) increase threat visibility and enhance breach discovery. Learn how to stop the uncontrollable spread of cyberthreats within your borderless network and prevent any single point from introducing vulnerability.
Posted: 08 Dec 2016 | Published: 30 Nov 2016

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement