IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone SpamReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Risk-Based Security Buyer's Guide: Addressing Enterprise-class Threats on an SME-class Budget
sponsored by TaaSera
WEBCAST: This exclusive whitepaper will show you how you must shift from a threat-based strategy that focuses on securing the perimeter to a risk-based approach that features a well-conceived incident response plan.
Posted: 08 Dec 2014 | Premiered: Nov 10, 2014

TaaSera

Encrypt Your Virtual and Cloud-Based Data Centers with SafeNet ProtectV
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper introduces a solution that offers persistent, secured storage for structured and unstructured data, wherever it resides.
Posted: 11 Dec 2014 | Published: 15 Aug 2013

SafeNet, Inc.

Cloud Computing & Mobile Technologies: Giving Government an Extra Dimension
sponsored by OpenText
WHITE PAPER: View this white paper to examine the steps to implement and initiate to secure clod and mobile strategies. Discover how these leveraging these disruptive services can help to better serve citizens who desire on-demand service. Read on to learn how your government organization can benefit from new channels.
Posted: 18 Dec 2014 | Published: 26 Nov 2013

OpenText

9 Ways to Secure Your Store Systems and Ensure PCI Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This white paper provides 9 strategies for retail security professionals to take control of their security posture and reduce the burden of achieving and maintaining PCI compliance.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Bit9, Inc.

An IT Auditor’s Guide to Security Controls & Risk Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This resource details a simpler, more effective approach to compliance that aims to help your enterprise to meet Governance, Risk, and Compliance standards, while managing the systems, files, and user permissions that you need to meet the needs of your organization.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Bit9, Inc.

Dell HPC: Intelligent Light accelerates research 20X
sponsored by Dell, Inc.
WHITE PAPER: This case study examines how one organization was able to keep up with growing computational fluid dynamics data by leveraging a solution that delivers cloud-based access to dedicated nodes on a Linux based cluster of next level servers. Read on to learn how this approach delivers faster access to high-performance computing resources and more.
Posted: 12 Dec 2014 | Published: 29 Feb 2012

Dell, Inc.

Detecting Cyber Attacks in a Mobile and BYOD Organization
sponsored by Vectra Networks
WHITE PAPER: This solution brief sets out to explore the challenges, understand the needs,evaluate mobile device management as an approach to detecting attacks. Read on to learn more.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Vectra Networks

The Threat and Vulnerability Management Maturity Model
sponsored by Core Security Technologies
WHITE PAPER: This exclusive whitepaper dives into the threat and vulnerability management maturity model, explaining how it works to reduce the risk of breach.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

Unlock New Pathways to Network Security Architecture
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement