IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Realize the Promise of VDI with Flash Storage
sponsored by Pure Storage
WHITE PAPER: If you're considering a virtual desktop infrastructure (VDI) implementation, or have one that isn't living up to expectations, read this white paper to learn about 4 common problems areas that cause VDI performance issues and how actual end-users were able to solve them with flash storage.
Posted: 20 Feb 2017 | Published: 30 Dec 2016

Pure Storage

10 Reasons Why Your IT Incidents Aren't Resolved Faster
sponsored by EverBridge Inc.
WHITE PAPER: When disaster strikes, one of the most important aspects of your recovery strategy is communication. Access this white paper to learn the top 10 reasons why your IT incidents are taking time to resolve and how improving your communication strategy helps prepare you to handle the unexpected.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

EverBridge Inc.

Matrix42-RS-MyWS-0027-Workspaces with- and in the cloud
sponsored by Matrix42
WHITE PAPER: Discover a workspace that not only enables the integration of cloud- and Web applications with remote desktop services, but also identity and enterprise mobility management, as well as license and subscription management – all within a single system.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Matrix42

App Security: Shore up the Weaknesses in Your WAF
sponsored by tCell
WHITE PAPER: Delve into the shortcomings of web application firewalls (WAFs) and how to shore up your defenses, protecting your web applications and modernizing your security policy to stand firm against today's threats landscape.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

tCell

Security in a Mobile First World
sponsored by AVST
WEBCAST: Watch this webcast to learn mobile practices that will provide your business with secure mobile communications.
Posted: 14 Feb 2017 | Premiered: Dec 15, 2016

AVST

Cloud Managed Services: A Comparison Guide
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Access this white paper to learn what to ask for in a managed cloud service providers. Use this as a guide to understand what you need, why you need it, and how to go about choosing the right partner.
Posted: 14 Feb 2017 | Published: 30 Jun 2016

Hewlett-Packard Enterprise

CW Nordics February 2017
sponsored by ComputerWeekly.com
EZINE: In this first issue of CW Nordics in 2017, we take a look what CIOs in the region are expecting in the year ahead. We asked a select group of CIOs and analysts in Denmark, Finland, Norway and Sweden what IT projects are at the top their priority lists.
Posted: 16 Feb 2017 | Published: 23 Feb 2017

ComputerWeekly.com

Using Hybrid Cloud Strategy to Drive Business Value
sponsored by IBM
RESOURCE: This resource illustrates the business value of hybrid cloud strategy implementation and how IT advisors can help businesses realize that value. Delve in to take a look at the benefit of integrating a hybrid environment in the enterprise and what to look for in a cloud provider.
Posted: 17 Feb 2017 | Published: 31 Dec 2015

IBM

Why Being Confident in Your Disaster Recovery Plan is Key to Stopping New and Rising Threats Like Ransomware
sponsored by Iron Mountain
EGUIDE: As the threat landscape evolves, you need to be able to change with it. In this expert guide, learn some of the ways ransomware operates in order to ready yourself for what may be an inevitable attack. Then, read about what tactics other companies use that allow them to be confident in the strength of their disaster recovery plan.
Posted: 22 Feb 2017 | Published: 22 Feb 2017

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement