IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed    Add to Google    Add to My Yahoo!
SMS SpamWhite Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

How to Safely Avoid Overcooling Your Data Center and Save Money Today
sponsored by Raritan Inc.
WHITE PAPER: Explore this in-depth whitepaper to discover how you can improve your data center efficiency without sacrificing uptime.
Posted: 17 Jul 2014 | Published: 31 Dec 2013

Raritan Inc.

Automating the Accounts Payable Process
sponsored by Perceptive Software
WHITE PAPER: Find out how AP automation can bring benefits to the entire organization.
Posted: 08 Jul 2014 | Published: 31 Mar 2014

Perceptive Software

AWS Security Best Practices
sponsored by Amazon Web Services
WHITE PAPER: This white paper provides security best practices that will help you define your Information Security Management System (ISMS), and build a set of policies to protect your data and assets in the AWS cloud.
Posted: 24 Jul 2014 | Published: 30 Nov 2013


Services Perspectives: Insight, guidance, and resources for maximizing the business value of IT
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore this in-depth whitepaper to learn about several success stories involving well-known businesses and Cisco. Discover how these organizations were able to optimize their IT through a partnership with Cisco.  Read on now to learn how such a partnership may be of benefit to your organization.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Cisco Systems, Inc.

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DMAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

ActivID® Threat Detection Service
sponsored by HID
WHITE PAPER: Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: 24 Jul 2014 | Published: 03 May 2013

HID

Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft – without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.
Posted: 21 Jul 2014 | Published: 15 Nov 2012

Dell, Inc. and Intel®

Implementing mobility/BYOD programs while maintaining regulatory compliance
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this in-depth resource to learn how you can deploy your own BYOD or mobility program. Discover how to select the right devices for your employees, and effectively manage mobile security within the network. Read on now to learn more.
Posted: 10 Jul 2014 | Published: 28 Feb 2014

Dell, Inc. and Intel®

How Small and Midsize Data Centers Can Benefit from Unified Infrastructure
sponsored by Cisco
WHITE PAPER: Explore this in-depth resource to learn how small and midsize enterprise data centers can benefit from unifed or converged infrastructures, and also learn four popular misconceptions regarding converged infrastructure that clarify what the system brings to data center management. Read on now to learn more.
Posted: 10 Jul 2014 | Published: 31 Dec 2013

Cisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement