IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Pager Spam

RSS Feed    Add to Google    Add to My Yahoo!
Pager SpamWhite Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Secure by Design: How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control and Other Critical Security Tasks
sponsored by Citrix
WHITE PAPER: This whitepaper examines how Citrix XenApp and Citrix XenDesktop solutions can dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple, flexible remote access that enhances business productivity.
Posted: 20 Aug 2014 | Published: 23 Jul 2014

Citrix

Ushering in a New Era in Mobile Data Security
sponsored by Bluebox
WHITE PAPER: In this informative white paper, discover a new mobile security platform that balances effective protection, data visibility, and app accessibility and freedom for the user.
Posted: 18 Aug 2014 | Published: 20 Aug 2014

Bluebox

Fax Security: Minimizing Breaches and Compliance Risks
sponsored by OpenText
WHITE PAPER: In this in-depth resource, you'll gain critical insights into the best practices and strategies for maintaining process control, information integrity, privacy, and effective archiving for your fax communications.
Posted: 19 Aug 2014 | Published: 31 Dec 2013

OpenText

The Impact of Data Breaches: Why Application Security is A Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

Managed File Transfer: Business Users Need Visibility
sponsored by IBM
WHITE PAPER: End-users are striving to enable collaboration and integrate as many business processes as possible, and in our information-driven society, managed file transfer (MFT) is tied closely with achievement of critcal business objectives.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: This in-depth whitepaper outlines a log management solution which can eliminate many of the complexities of information security while maintaining the integrity of computing resources.
Posted: 07 Aug 2014 | Published: 31 Dec 2012

IBM

Red Hat Accelerated Mentoring: Openstack Architecture
sponsored by Red Hat
WHITE PAPER: This exclusive whitepaper details a mentoring-based delivery model for closing the operational gap when implementing new technology into your data center.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

Red Hat

Understaffed And At Risk: Today’s IT Security Department
sponsored by HP and Intel
WHITE PAPER: This Ponemon study explores how organizations can most effectively hire and retain expert security staff in order to help achieve business goals.
Posted: 22 Aug 2014 | Published: 28 Feb 2014

HP and Intel

Finding the Security Balance for Virutal Environments
sponsored by Kaspersky Lab
WHITE PAPER: This in-depth white paper will help you identify the right security approach for your virtual environment that won't be a drain your system's performance.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement