IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Push Messaging White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

The Latest Trends Surrounding Collaboration in the Workplace
sponsored by Premiere Conferencing
WHITE PAPER: Access this white paper that highlights trends and technologies that are powering business collaboration in 2015.
Posted: 02 Mar 2015 | Published: 02 Mar 2015


Traps Advanced Endpoint Protection: Technology Overview
sponsored by Palo Alto Networks
WHITE PAPER: This white paper describes a security approach that provides protection before the attacks can penetrate.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

Palo Alto Networks

How to Fight Advanced Threats
sponsored by IBM
WHITE PAPER: This white paper examines how and why enterprises have failed to protect themselves against advanced threats and gives suggestions for better security.
Posted: 06 Mar 2015 | Published: 31 Jan 2015

IBM

2015 Annual Securty Report
sponsored by Cisco
WHITE PAPER: This annual security report gives you indispensible insights from security experts that will help you stay up to date on cyber security in 2015.
Posted: 06 Mar 2015 | Published: 01 Jan 2015

Cisco

How cloudy is my IT forecast?
sponsored by Dimension Data
WHITE PAPER: More and more organizations are moving to the cloud. Chances are, your organization is among them. But how can you be sure you're getting the most out of your investment?This resource provides practical considerations for integrating on-premise and cloud environments to deliver the right outcomes for your business.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

Dimension Data

5 Threats Google Apps Can't Defend
sponsored by Datto, Inc.
WHITE PAPER: In this white paper, learn the five threats that Google can't defend and how to protect your data on your own. Read on now to learn more.
Posted: 06 Mar 2015 | Published: 04 Feb 2015

Datto, Inc.

Best Practices for Creating the Network-Enabled Cloud
sponsored by XO Communications
WHITE PAPER: Access this white paper to discover a step-by-step guide to help improve your network to handle services delivered from multiple clouds.
Posted: 02 Mar 2015 | Published: 31 Dec 2014

XO Communications

PowerEdge FX: Workload Defined Infrastructure, Converged
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: How can you bridge traditional and software-defined workloads on a single modular IT platform?This white paper explores a new approach to converged infrastructure that gives you the flexibility to tailor converged compute, storage and networking resources to meet specific workload requirements.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

Dell, Inc. and IntelĀ®

Survey Results: How Are Security Analytics Used?
sponsored by AlienVault
WHITE PAPER: This survey explores issues of security analytics and intelligence, revealing how IT security teams use those tools to detect cyber-attacks.
Posted: 23 Feb 2015 | Published: 31 Dec 2014

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement