IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

How To Eliminate Downtime With NGFWs
sponsored by Forcepoint
WHITE PAPER: Uninterrupted access to Internet-based apps, data, and servers are crucial to a successful business. But how do you eliminate downtime that can get in the way? In this white paper, learn how NDFW security technology can maintain network defenses and make downtime a distant memory.
Posted: 17 Feb 2017 | Published: 04 Mar 2016

Forcepoint

Your Guide to Advanced Persistent Threat Protection
sponsored by Forcepoint
WHITE PAPER: In this guide find a detailed breakdown of how individual vendors fit within the advanced-persistent threat market and who the top players, trail blazers, specialists, and mature players are. Discover market segmentation and an in-depth breakdown of each organization in the field.
Posted: 16 Feb 2017 | Published: 16 Apr 2016

Forcepoint

A CISO Perspective: Why Unified Security Solutions are a Necessity
sponsored by Forcepoint
WEBCAST: Get a solid look at the market drivers that are favoring the adoption of unified security, as well as the technical and operational blueprints for a successful unified security policy.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017

Forcepoint

Protect Your Critical Assets with Identity Governance and Intelligence
sponsored by IBM
WHITE PAPER: Learn how integrating policy and governance controls with identity management processes would help your organization undersand, control, and make better business decisions related to access and risk.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

IBM

How Data Privacy Laws Impact Cloud Adoption In The UK
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.
Posted: 23 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Taking a Proactive Approach to Addressing Ransomware
sponsored by AttackIQ
WEBCAST: In this webcast, industry expert Kevin Beaver discusses the challenges associated with ransomware and proactive steps that can be taken to minimize the threat and fortify information security programs.
Posted: 17 Feb 2017 | Premiered: Feb 8, 2017

AttackIQ

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
RESOURCE: Discover 11 steps your IT needs to take when adopting cloud apps and services to ensure the safety of your organization.
Posted: 21 Feb 2017 | Published: 20 Feb 2017

Symantec & Blue Coat Systems

Matrix42-RS-MyWS-0027-Workspaces with- and in the cloud
sponsored by Matrix42
WHITE PAPER: Discover a workspace that not only enables the integration of cloud- and Web applications with remote desktop services, but also identity and enterprise mobility management, as well as license and subscription management – all within a single system.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Matrix42

5 Key Questions About Hybrid Cloud
sponsored by Microsoft
EBOOK: In a world overrun by big data, there's only storage option to keep you head above water...way above it. Hybrid cloud: coming soon to an IT environment near you.
Posted: 15 Feb 2017 | Published: 30 Dec 2016

Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement