IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Managing the Madness of Mobility
sponsored by Sprint
EBOOK: For too long, high buy-in costs, time-consuming management tasks, and rigid, inflexible data plans have stopped businesses from empowering their employees with the latest productivity-boosting wireless. This e-book highlights a new model for mobility-as-a-service, and details several of its benefits.
Posted: 31 Jul 2015 | Published: 31 Jul 2015

Sprint

5 Best Practices to Make Security Everyone's Business
sponsored by Citrix
WHITE PAPER: This white paper presents the five steps you can take to help your end users advance your security strategy instead of hindering it.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Case Study: The Security Needs of a Growing Cloud Company
sponsored by CrowdStrike
VIDEO: In this brief video, the chief security officer of Rackspace explains how he met the challenges of securing hundreds of thousands of cloud infrastructures.
Posted: 03 Aug 2015 | Premiered: 03 Aug 2015

CrowdStrike

Business Analytics in the Cloud
sponsored by IBM
WHITE PAPER: This white paper explores the role of cloud computing in driving the benefits that analytics can provide. Discover how multiple industries are gaining advantages from cloud-based analytics from both an IT and a business perspective.
Posted: 30 Jul 2015 | Published: 30 Apr 2012

IBM

Case Study: Achieving Next Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: This case study describes how a managed care provider strengthened its security by obtaining visibility into all endpoints across the network.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Gartner Report: New CIO Responsibilities in a Digital Business World
sponsored by Mendix
ANALYST REPORT: This Gartner report divulges findings from the latest research on how CIOs are staking out their digital leadership roles, for which one size doesn't fit all. Read on to learn experts' recommendations for clarifying CIOs' new set of responsibilities for the modern era of IT.
Posted: 30 Jul 2015 | Published: 28 May 2015

Mendix

Test Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This free demo allows you to test out a security platform that promises to help you better monitor, analyze and report on malicious behavior in your network.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015

AlienVault

Best practices to enable clinician mobility for patient centered healthcare
sponsored by Citrix
WHITE PAPER: This white paper offers tips for healthcare organizations seeking the benefits of a more mobile environment. Read on to learn strategies, solutions, and real-world examples for transforming healthcare IT without sacrificing security or compliance.
Posted: 31 Jul 2015 | Published: 30 Apr 2013

Citrix

Using Managed Endpoint Security to Grow Your Managed Services Business
sponsored by Solarwinds N-able
WHITE PAPER: This white paper outlines how MSPs can prevent client chaos by implementing managed endpoint security into their services.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Solarwinds N-able
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement