IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Eight Essential Elements for Effective Threat Intelligence Management
sponsored by BrightPoint Security
WHITE PAPER: This white paper contains eight techniques you can adopt to keep up with the ever-shifting threat intelligence landscape.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

BrightPoint Security

Six Ways IT Will Move from the Back Office to the Boardroom
sponsored by Polycom, Inc.
WHITE PAPER: This white paper highlights the 6 dynamic ways IT is transforming its role from back office support to front and center in the boardroom. Read on to catch the 6 newest enterprise IT trends.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Polycom, Inc.

An IT Survival Guide: Big Chaos in Small Packages
sponsored by Lenovo and Microsoft
WHITE PAPER: Read the following white paper to learn about the steps you can take to minimize loss or destruction when devices leave work.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Lenovo and Microsoft

Data Breach Readiness 2.0
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

ComputerWeekly.com

Security Essentials for CIO's: Secure the Extended Workplace
sponsored by IBM
WHITE PAPER: This white paper discusses the problems 3rd party contractors pose to security and gives tips for ensuring your business partnerships are as safe as possible.
Posted: 28 Aug 2015 | Published: 30 Sep 2012

IBM

Adopt New Enterprise UC Technologies with Speed, Agility, and Security
sponsored by Red Hat
WHITE PAPER: This white paper will introduce you to several third-party collaboration technologies that will help you innovate ahead of business demands. Access this white paper to learn how to select the proper collaboration technologies for you that can foster interoperability in your organization.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Red Hat

Optimized Sourcing in Hybrid IT Environments: Impacts and Improvements
sponsored by IBM
WHITE PAPER: This white paper explains how multiple-sourced, hybrid IT and business reality is developing and accelerating. Read on to find out how to manage your hybrid IT environment, as well as to engage third-party research that will assess sourcing services for your organization.
Posted: 01 Sep 2015 | Published: 30 Apr 2014

IBM

Don’t Build a House of Cards The 5 Pillars of Project Portfolio Management
sponsored by Innotas
WHITE PAPER: This white paper discusses the five critical pillars of project portfolio management and how you should think about each of aspect.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Innotas
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement