IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Three Moves for CIOs to Lower Business Costs with Cloud
sponsored by BMC
ANALYST REPORT: By accessing this report, you'll learn three moves all CIOs should enact to achieve a cost-effective differentiation with cloud. Did you know that CIOs managing cost optimization should create a cost center of excellence (CCoE) for the cloud? To discover the remaining two recommendations, read on.
Posted: 02 Aug 2017 | Published: 24 Mar 2017

BMC

Top 5 IT Processes: What if Your Job Involved More Doing and Less Spinning?
sponsored by Nintex
WHITE PAPER: Efficiency is key – so this white paper explores how to automate key IT processes and daily tasks to free up valuable time and resources. Uncover the top 5 IT processes that benefit from business process automation, and learn how to improve a variety of functions from push notifications to help desk support.
Posted: 14 Aug 2017 | Published: 14 Aug 2017

Nintex

Equinix Delivers Security Intelligence with Cloud-Based SIEM
sponsored by Splunk
CASE STUDY: Read this case study to uncover how Equinix, a large technology company, enhanced their security posture with Splunk.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Splunk

Compliance Challenges & Security Effectiveness in the Workplace
sponsored by Citrix
RESEARCH CONTENT: Organizations admit challenges in reducing the risk from unapproved apps and devices. Read this white paper to discover global trends in IT security risks.
Posted: 16 Aug 2017 | Published: 31 Mar 2017

Citrix

Effectively Balancing DevSecOps
sponsored by Flux7
WHITE PAPER: As app development becomes more agile, security can get left in the dust – and conversely, if security and testing takes too long, it can decelerate the app lifecycle and impede organizational agility. Learn how to enables DevSecOps with security automation for AWS and cloud-based development environments.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Flux7

What is Next-Generation Antivirus, or NGAV?
sponsored by Carbon Black
VIDEO: Next Generation Antivirus (NGAV) prevents cyberattacks on a large spectrum and provides more coverage with less resource requirements. Learn more about NGAV in this webcast.
Posted: 11 Aug 2017 | Premiered: 19 Jul 2017

Carbon Black

Lock Down Your Server Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Protecting your server at the software level is no longer enough. Attackers have started going after your hardware. Access this white paper to learn how to secure your server hardware and firmware at every level of the enterprise.
Posted: 08 Aug 2017 | Published: 30 Jun 2017

Hewlett Packard Enterprise

Rethink Your Strategy to Defeat Evasive Attacks
sponsored by Palo Alto Networks
WHITE PAPER: Malware is rapidly changing, and security policies need to change alongside it. Inside, learn about why implementing an analytics-based threat detection system is your best bet at keeping your network safe.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Palo Alto Networks

PASSIVE Voice Biometrics in ACTIVE Channels
sponsored by NICE Systems, Inc
RESEARCH CONTENT: Learn about the evolution of active vs. passive voice biometrics (VB) and how they combine with other speech processing technologies like automated speech recognition (ASR) to improve authentication and identity assertion in tandem with machine learning and AI.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

NICE Systems, Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement