IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone SpamReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Be Ready for Cyber-Attacks with New Endpoint Security and Monitoring Solutions
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this helpful white paper, uncover a new endpoint threat detection platform that can prepare your organization to fight back against inevitable cyber-attacks.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

Mobile Security: Threats and Countermeasures
sponsored by MobileIron
WHITE PAPER: Mobile devices are quickly becoming the device of choice for the primary end-user. The intuitive user-experience, robust computing capabilities, extensive catalog of apps, and always-on connectivity combined with portability make mobile devices very compelling PC replacements.
Posted: 22 Aug 2014 | Published: 22 Aug 2014

MobileIron

Put Security on the Agenda: Aligning IT Security with Business Goals
sponsored by Kaspersky Lab
WHITE PAPER: Read this in-depth guide to discover new integrated systems management and mobile device management solutions that could help your organization enhance its existing security plan.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab

Create a More Agile Data Center with Data Center Infrastructure Management
sponsored by nlyte Software
WHITE PAPER: This exclusive whitepaper looks at the value of data center infrastructure management in making a more agile data center.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

nlyte Software

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

Today's IT Risks: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
PRESENTATION TRANSCRIPT: In this helpful resource, industry veterans explore the biggest security challenges and trends facing IT professionals today, and explore the best practices for efficiently approaching these issues.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Enable Secure Access to Apps
sponsored by Fiberlink
DATA SHEET: The BYOD era has left IT with less control over the network, creating security and network integrity problems.  IT professionals are constantly striving to secure sensitive enterprise data and discover vulnerabilities.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Fiberlink

Top Five Alternatives to Endpoint Antivirus Software
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this in-depth Forrester report, discover the top 5 technologies that security professionals are using to replace outdated antivirus software.
Posted: 26 Aug 2014 | Published: 09 Jun 2014

Bit9 + Carbon Black

Security Report 2014: Trends and Developments in the Security Industry
sponsored by IBM
WHITE PAPER: In this informative report, discover the most important security trends of last year, ranging from malware delivery to mobile device risks.
Posted: 26 Aug 2014 | Published: 28 Feb 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement