IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Endpoint Protection
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: As the threat environment evolves quickly and becomes more complex, organizations are struggling to keep up. Check out this white paper to learn more about the essential capabilities for boosting endpoint security.
Posted: 22 Aug 2017 | Published: 22 Aug 2017

Symantec & Blue Coat Systems

How the Williams Martini Racing Team Protects its Data
sponsored by Symantec & Blue Coat Systems
CASE STUDY: Check out this case studying exploring how Williams Martini Racing overcame the challenge of securing high-value data by implementing endpoint, web, and data center protection.
Posted: 18 Aug 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Protect with this Endpoint Security & Save Money, Too
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

Symantec & Blue Coat Systems

The Human Factor in Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Through email, attackers trick people into installing malware, handing over their credentials, disclosing sensitive information and transferring funds. Read this white paper to uncover strategies that can detect and block phishing messages prior to reaching targets.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Proofpoint, Inc.

HCI Can Pave the Way to a Software-defined Platform and the SDDC
sponsored by Hewlett Packard Enterprise
EGUIDE: Before purchasing and implementing a complete SDDC, download this guide to determine how much of a software-defined platform your business needs. You'll discover the role of HCI in SDDCs, and learn how build an SDDC by using HCI's software-defined platform as foundation for version-controlled node automation, and more.
Posted: 21 Aug 2017 | Published: 16 Aug 2017

Hewlett Packard Enterprise

High-growth Best Practices Guide
sponsored by Spectrum Enterprise
WHITE PAPER: What does high growth mean to you? Ultimately, you will need high-performance network connectivity and a future-proof technology strategy. This guide explores the steps to building a foundation for sustainable growth and strategies for planning for new technologies.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Spectrum Enterprise

IT and Business Management Roles in Cybersecurity
sponsored by Cisco Systems, Inc.
WHITE PAPER: Cybercrime has become so widespread because of its lucrative payoff. Read this white paper to uncover how business and IT managers can work together to build and implement a successful cybersecurity plan.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Cisco Systems, Inc.

Use AWS to Secure Your DevOps Pipeline Like a Bank
sponsored by Stelligent
VIDEO: From security of the source code used to trigger builds, to the insertion of strict business controls at run time, and out to the continuous inspection of the running infrastructure to ensure compliance, this webcast teaches you how to build capabilities that are enabling them to run their business faster and safer on AWS.
Posted: 21 Aug 2017 | Premiered: 29 Nov 2016

Stelligent

Five Pitfalls to Avoid for a Pain-Free Two-Factor Authentication Deployment
sponsored by RSA
RESEARCH CONTENT: In this May 2016 Forrester Research report, examine 5 pitfalls that security pros should take care to avoid when deploying a two-factor authentication tool. For each pitfall, discover actionable recommendations that will help you ensure a smooth and seamless deployment.
Posted: 23 Aug 2017 | Published: 23 May 2016

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement