IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed    Add to Google    Add to My Yahoo!
SMS Spam White Papers (View All Report Types)
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Determining your MSP Offerings: Don't Sell Yourself Short
sponsored by LogicNow
WHITE PAPER: This resource offers tips on setting goals as a management service provider (MSP.) Learn how to propose a plan of action that helps your clients enter the next phase of their technology infrastructure.
Posted: 25 Oct 2016 | Published: 25 Oct 2016


Addressing Mobile App Risk
sponsored by Appthority
WHITE PAPER: Uncover why enterprises need to take a mobile first approach to the security of employees and the data they access/share via apps on their mobile devices.
Posted: 30 Sep 2016 | Published: 30 Sep 2016


Streamlining Security Incident and Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: The biggest obstacles to achieving "incident response excellence" are security and IT tool integration and coordinating incident response. Learn how the right security operations solution could simplify the coordination of incident response measures, effectively reducing your time-to-response.
Posted: 29 Sep 2016 | Published: 29 Sep 2016


User Behavior Analysis in the Cloud
sponsored by Symantec + Blue Coat
WHITE PAPER: Visibility into real-time traffic, the apps users access, and the activity within these apps can help organizations keep risk out of their cloud environments. Learn more about the powerful combination of machine learning and cloud computing.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

Symantec + Blue Coat

The CASB Challenge: APIs or Proxies?
sponsored by Palerra Inc.
WHITE PAPER: Access this resource to understand the two approaches enterprises have been taking to Cloud Access Security Brokers - proxy and API – and which would be the best for your enterprise.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

Palerra Inc.

A Security Intelligence and Analytics Platform That Helps You Neutralize Cyber Threats
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper you'll learn about an intelligence and analytics platform that allows you to detect and neutralize cyber threats in real-time. Find out how you can centralize your visibility to eliminate data silos, automatically contextualize over 750 data sources to get the most up-to-data view of your security protocols, and more.
Posted: 10 Oct 2016 | Published: 31 Jul 2016

LogRhythm, Inc.

Red Hat CloudForms Unifies and Improves Service Delivery and Management
sponsored by Red Hat
WHITE PAPER: As your infrastructure evolves toward an Infrastructure-as-a-Service model, you need a management platform that follows suit. Download this white paper to simplify hybrid IT management with a platform that evolves to handle all container, virtual, private, and public cloud infrastructures.
Posted: 12 Oct 2016 | Published: 30 Jun 2016

Red Hat

Extending Global Load Balancing to the Cloud With Secondary DNS
sponsored by Dyn
WHITE PAPER: Discover how on premise global load balancing (GLB) can become part of your cloud deployment. With GLB enhancing your DNS networks, you can improve security and prevent DDoS attacks.
Posted: 10 Oct 2016 | Published: 13 Jul 2016


Enhance AWS Security with Splunk Solutions
sponsored by Splunk
WHITE PAPER: Security is still a top cloud concern. Learn how to protect your AWS infrastructure with Splunk.
Posted: 06 Oct 2016 | Published: 06 Oct 2016

TOPICS:  IT Management
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement