IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed    Add to Google    Add to My Yahoo!
SMS Spam White Papers (View All Report Types)
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Data Encryption and Redaction: A Review of Database Security
sponsored by Oracle Corporation
WHITE PAPER: This SANS report examines the importance of database security and discusses measures you can take to make your databases impenetrable.
Posted: 16 Nov 2015 | Published: 30 Sep 2014

Oracle Corporation

A Guide to Server Managed Services and Integrated Managed Infrastructure
sponsored by IBM
WHITE PAPER: In this guide, you will discover how to leverage outsourced server platform management to increase your server operational efficiency. Access this guide now to drive down infrastructure management costs using virtualization and cloud monitoring.
Posted: 13 Nov 2015 | Published: 31 Dec 2014


Optimizing Patient Care with Desktop and App Virtualization
sponsored by Citrix
WHITE PAPER: This white paper details the current challenges IT leaders face in healthcare and explains how application and desktop virtualization plays a central role in supporting clinical workflows. Learn how your peers are using virtualization strategies to improve patient care.
Posted: 12 Nov 2015 | Published: 30 Jan 2015


Best Practices for Securing Workloads in Amazon Web Services
sponsored by
WHITE PAPER: Access this informative resource to explore best practices for securely deploying enterprise workloads in AWS. You'll also learn how these tips can apply to securing workloads in other IaaS strategies.
Posted: 24 Nov 2015 | Published: 15 Apr 2015

Protect Your Intellectual Property and Customer Data From Theft and Abuse
sponsored by TITUS
WHITE PAPER: This Forrester report shows you how to take an effective and holistic approach to data security in today's challenging environment.
Posted: 13 Nov 2015 | Published: 10 Jul 2015


Special Report: Incident Response Capabilities Needed
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The SANS 2015 survey of the incident response capabilities found both good news and bad news. Read on to discover what the survey found and what those results mean for your organization.
Posted: 24 Nov 2015 | Published: 31 Aug 2015

Hewlett Packard Enterprise

Are You Getting the Most From Your IT Environment?
sponsored by IBM
WHITE PAPER: This infographic discusses how the right sourcing provider can help you get the most from your hybrid IT environment.
Posted: 10 Nov 2015 | Published: 31 Dec 2014


Outrunning the Bear: 5 Critical Ways To Take a More Collaborative Approach To IT Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper examines the challenges inhibiting faster threat response and suggests five critical steps organizations can take to turn security intelligence into action.
Posted: 12 Nov 2015 | Published: 29 May 2015

Hewlett Packard Enterprise

The Global Cost of Cyber Crime
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover the most salient findings of this enterprise security and intelligence study and learn what you can do to protect your organization.
Posted: 20 Nov 2015 | Published: 31 Oct 2015

Hewlett Packard Enterprise
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement