IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Push Messaging White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Driving Data Center Growth and Innovation with Trusted Hardware Support
sponsored by IBM
WHITE PAPER: Discover a technical support service designed to help you respond effectively to changing hardware demands, from expanding product and service lines to regulatory mandates. Read on to learn about proactive support that will simplify your IT asset management, enhance service quality, and control costs.
Posted: 27 Mar 2017 | Published: 31 Dec 2016

IBM

Reduce the Number of Ransomware Infections Across Your Organization
sponsored by Cisco and Dimension Data
WHITE PAPER: Ransomware is becoming a bigger threat every quarter. Learn what ransomware truly is and how it works, as well as what can be done to mitigate its threat to your organization.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Cisco and Dimension Data

5 Reasons Why Mobile Will Transform Enterprise Authentication
sponsored by Entrust, Inc.
WHITE PAPER: Mobile presents unique security considerations for enterprises, but if handled properly these challenges can be mitigated and pave the way for mobile to become a trusted, convenient and multi-purpose enterprise digital ID. Access this white paper to learn 5 reasons why mobile will transform business authentication.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Entrust, Inc.

Endpoint Visibility For Wired And Wireless
sponsored by Hewlett Packard Enterprise
WHITE PAPER: With the billions of IoT devices expected to connect to networks in the next three years there is a warranted demand among IT professionals for real-time visibility and reporting. In this white paper, learn how you can get the real-time, endpoint visibility and reporting you need keep up with IoT and BYOD.
Posted: 24 Mar 2017 | Published: 30 Nov 2016

Hewlett Packard Enterprise

Safeguard Data Stored and Managed in Cloud Environments
sponsored by Gemalto
WHITE PAPER: This white paper will serve as a measuring stick for your current encryption as well as a template to take it to the next level. To truly keep company data safe from unauthorized access you'll need an encryption strategy that considers every facet of the process: from the coding of the data to the creation and management of the encryption keys.
Posted: 15 Mar 2017 | Published: 15 Mar 2017

Gemalto

Remove Complexity from Defending Data with a Secure Managed Cloud
sponsored by Armor
WHITE PAPER: The complexities of cybersecurity are daunting for any organization. But for businesses that need battle-tested security and infrastructure to defend critical data workloads and assets that intricacy is magnified. Learn about a cloud security platform that can remove the complexity from defending data with key security functionality.
Posted: 15 Mar 2017 | Published: 30 Dec 2016

Armor

Data Center: Build vs Buy
sponsored by Colospace Inc.
WHITE PAPER: Your data center needs to be on the cutting-edge to make sure it can handle any technological disruptions that pop up. The question is, do you build and maintain your own or buy into colocation? Access this white paper to learn about colocation and the reasons why it is growing in popularity.
Posted: 07 Mar 2017 | Published: 07 Mar 2017

Colospace Inc.

How to Prevent Attacks from Ever Breaching You in the First Place
sponsored by Cisco and Dimension Data
WHITE PAPER: Discover how today's sophisticated attacks routinely evade conventional after-the-fact technologies such as firewalls and signature-based malware detection, and why it's now essential to adopt new measures that predictively neutralize these modern threats.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Cisco and Dimension Data

SonicWall 2017 Threat Report: The State of the Cybersecurity Arms Race
sponsored by SonicWall
WHITE PAPER: This SonicWall Annual Threat Report defines the cybersecurity battlefield and enables you to mount an impenetrable defense in 2017 and beyond.
Posted: 10 Mar 2017 | Published: 31 Jan 2017

SonicWall
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement