IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Push Messaging White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Multination Banking Company
sponsored by Digital Guardian
WHITE PAPER: This white paper shares the security story of a bank with over 50,000 employees and who serves over 50 million credit card customers.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

40 Question You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

Eliminating the Drawbacks of Distributed SaaS Provider Identity
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to adopt a safe and secure SaaS model by eliminating the drawbacks of distributed SaaS provider identity and access management systems, in addition to enhancing your security profile. Access this paper to eliminate SaaS access management silos.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

Performance Monitoring for Your Virtualized Infrastructure: Considerations and Checklist
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will find a checklist of monitoring-related criteria that both enterprises and service providers should consider with due diligence when managing application performance for virtualized Citrix infrastructures.
Posted: 05 Feb 2016 | Published: 31 Jan 2016

eG Innovations, Inc.

5 Ways to Extend Security Beyond Dropbox
sponsored by Vera
WHITE PAPER: Access this white paper to discover how you can better protect your files in Dropbox. Learn to protect, secure and track all you confidential and sensitive content.
Posted: 25 Jan 2016 | Published: 09 Dec 2015

Vera

Top 6 Dangers of Not Inspecting SSL Traffic
sponsored by A10 Networks
WHITE PAPER: Encryption can improve message confidentiality and integrity but it may also mask hackers' activities. Access this white paper to learn six additional dangers of not inspecting SSL traffic, and what your business can do to expose threats.
Posted: 25 Jan 2016 | Published: 21 Jan 2016

A10 Networks

Best Practices for Securing Privileged Identities
sponsored by CA Technologies
WHITE PAPER: Baseline OS protection is not enough to protect from today's sophisticated attacks. Download now to examine how you can supplement your security system and reduce your risk with four key steps to effective security of privileged accounts.
Posted: 01 Feb 2016 | Published: 30 Jun 2015

CA Technologies

Compensating Security Controls for Windows Server 2003 Security
sponsored by TrendMicro
WHITE PAPER: This white paper shows you a solution while you're in the process of migration. Learn how you can get network, system and anti-malware security controls across physical, virtual and cloud systems running W2K3.
Posted: 04 Feb 2016 | Published: 31 May 2015


5 Ways Vera Makes Office 365 More Secure
sponsored by Vera
WHITE PAPER: In this white paper, learn how you can protect every document your team creates, without sacrificing the simple, consistent user experience you count on.
Posted: 25 Jan 2016 | Published: 02 Dec 2015

Vera
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement