IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Mitigating Risk with Security Intelligence and Identity Assurance
sponsored by IBM
WHITE PAPER: Access this white paper to learn about an integrative approach that lets companies quickly identify abnormalities in user behavior, as well as fighting insider threats all while complying with regulations.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM

Best Practices for Virtualizing and Protecting Exchange Server
sponsored by Veeam Software
WHITE PAPER: In this white paper, you'll learn about the considerations that must be taken into account when virtualizing Exchange Server. You'll learn why it's important to avoid using dynamic hardware allocations or overcommitments, and avoid manipulating state data. Read on to learn more.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

Veeam Software

Next Generation Firewalls: What Can They Do for You?
sponsored by Cisco
EGUIDE: In this expert guide you can find tips on assessing your security needs and deciding if a next generation firewall is a smart choice for you.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Cisco

Financial Malware Explained
sponsored by IBM
WHITE PAPER: This white paper gets you inside the head of a fraudster and gives you insight into how they work.
Posted: 25 Feb 2015 | Published: 31 Dec 2014

IBM

Using SCCD to Resolve an Issue
sponsored by IBM
VIDEO: This video examines how a held desk agent can use SmartCloud Control Desk to resolve an incident. View now to get a step-by-step breakdown of this process.
Posted: 23 Feb 2015 | Premiered: 07 May 2014

IBM

Top 5 Web and Mobile App Security Challenges
sponsored by Veracode, Inc.
RESOURCE: Access this brief infographic to learn the top five challenges to securing web and mobile applications today. View now to explore an alternative strategy to reduce app-layer risk.
Posted: 26 Feb 2015 | Published: 27 Jan 2015

Veracode, Inc.

Trends that matter for 2015
sponsored by ComputerWeekly.com
ANALYST BRIEF: Marc Dowd, principal advisor at analyst group Forrester, gives his predictions for the top trends in technology, business and the IT department in 2015.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

ComputerWeekly.com

PowerEdge FX: Workload Defined Infrastructure, Converged
sponsored by Dell, Inc. and Intel®
WHITE PAPER: How can you bridge traditional and software-defined workloads on a single modular IT platform?This white paper explores a new approach to converged infrastructure that gives you the flexibility to tailor converged compute, storage and networking resources to meet specific workload requirements.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Dell, Inc. and Intel®

Making Smart Decisions in Evaluating and Selecting a Supplier of Converged Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This expert resource gives insight into what to look for in a converged infrastructure supplier. You'll also examine a converged infrastructure approach built to reduce complexity, scale across a wide range of applications and workloads, and deliver superior price/performance ratios.
Posted: 24 Feb 2015 | Published: 20 Feb 2015

Dell, Inc. and Intel®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement