IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone SpamReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Secure Mobile Communications in Healthcare
sponsored by Vocera
EGUIDE: This expert E-Guide highlights how one company remakes itself as a device independent platform.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Vocera

Surveying the Cloud Service Provider Landscape
sponsored by Internap
VIDEO: In this webinar, you'll survey the cloud service provider landscape and get insight into the different types of vendors based on the strategic value that they can bring to businesses buying cloud services. You'll also examine how hybridization is shaping cloud deployment strategies.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014

Internap

Using Network Flow Analysis To Improve Network Security Visibility
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Hit the Ground Running: Opening a New Office Without the IT and Comms Roadblock
sponsored by Sprint
WHITE PAPER: This exclusive white paper explores how to make a smooth transition when opening up a new branch.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Sprint

Customer Use Case: JMAC Lending
sponsored by Quest Systems
CASE STUDY: Explore how desktop-as-a-service enabled an organization to align all of its virtualization efforts in order to support a flexible work environment from anywhere, on any device while keeping applications and data secure.
Posted: 19 Dec 2014 | Published: 19 Dec 2014

Quest Systems

Taking Control of File Sharing Services
sponsored by Mimecast
WHITE PAPER: This informative white paper discusses how file sharing services are being used within enterprises; the benefits and risks that they bring; and the factors that organizations should consider in selecting an enterprise-grade service in order to ensure its security.
Posted: 19 Dec 2014 | Published: 30 Apr 2014

Mimecast

Securing the Path to Consolidation in Today's Data Center
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explores how multi-layer encryption and centralized key management can enable enterprises to accelerate cloud, virtualization, and data center consolidation initiatives, while retaining the controls they need to protect sensitive data and adhere to internal and external compliance regulations.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

Simplifying cloud management and data center automation
sponsored by IBM
WHITE PAPER: Access this resource to learn more about the value of standardizing and automating cloud services with a flexible platform. You'll get insight into how you can orchestrate the development, deployment and management of cloud services - helping to reduce IT costs and accelerate service delivery.
Posted: 12 Dec 2014 | Published: 30 Apr 2014

IBM

Gaining Agility and Control in VMware vSphere and Hybrid Cloud Environments
sponsored by Dell, Inc.
WHITE PAPER: This white paper examines a new cloud management approach that provides users with the on-demand, self-service infrastructure they need, while easily managing how services are consumed and maintaining the governance required by today's enterprises.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement