IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Pager Spam

RSS Feed    Add to Google    Add to My Yahoo!
Pager Spam White Papers (View All Report Types)
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Sizing The Cloud Security Market
sponsored by HyTrust
WHITE PAPER: This report by Forrester Research organizes today's fragmented set of cloud security solutions into four discrete categories for S&R pros and projects spending patterns for the cloud security category as a whole.
Posted: 05 Oct 2015 | Published: 25 Aug 2015


Building a Business- and IT-Driven EMM Strategy
sponsored by IBM
WHITE PAPER: This white paper demonstrates the necessity of designing a business-driven app strategy that advances business goals - without putting enterprise data and your network at risk. Learn how to help IT work with the business and answer 8 pertinent EMM questions.
Posted: 06 Oct 2015 | Published: 06 Oct 2015


An Executive's Guide to Budgeting for SIEM Systems
sponsored by Trustwave
WHITE PAPER: This white paper calculates how much in-house SIEMs and managed SIEM services cost an enterprise, helping you determine which option is most cost-effective for your business.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


5 Days to Setting Up an Application Security Program
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 01 Oct 2015 | Published: 12 Jan 2015

WhiteHat Security

Evaluate and Evolve Your Network Security Program in 10 Steps
sponsored by FireEye
WHITE PAPER: This white paper serves as a comprehensive guide for IT professionals evaluating enterprise network security. Read this report now to access the 10-step process for proper security program evaluation, how to conduct a program assessment, and more.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


The Bimodal IT Approach
sponsored by Melbourne IT
WHITE PAPER: In this white paper, learn how to effectively adopt a Bimodal IT operational model. Additionally, see how taking the strategic step towards cloud integration with enterprise services can improve workflow, application delivery, and more.
Posted: 02 Oct 2015 | Published: 02 Oct 2015

Melbourne IT

Case Study: Oxford University Hospitals Cuts Waste with Single Sign-On
sponsored by Imprivata
WHITE PAPER: Access this case study to discover how Oxford University Hospitals sped up the process of secure EPR access, cutting out waste and freeing up more time for patient care.
Posted: 25 Sep 2015 | Published: 31 Dec 2014


Managed File Transfer (MFT) as a Shared Service — Be Your Own Cloud
sponsored by Axway
WHITE PAPER: In this white paper, discover how you can deliver advanced managed file transfer (MFT) capabilities by consolidating all file flows into a highly scalable and secure shared service, set up like a cloud. Read on to learn more.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Top 10 Disaster Recovery Pitfalls
sponsored by NTT America, Inc.
WHITE PAPER: Access this white paper to uncover ten most common disaster recovery pitfalls and helpful hints to guide you in developing your own disaster recovery plan.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

NTT America, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement