IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Deliver Total Performance Visibility Over All Network Applications
sponsored by eG Innovations, Inc.
CASE STUDY: In this case study, you will discover how St. Charles improved their patient care and boosted satisfaction by unifying their application performance monitoring. Learn how to streamline your IT service delivery with this platform and accelerate diagnosis of performance issues in virtualized applications by reading on.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

eG Innovations, Inc.

Data-Aware Storage: Introducing a New Era of Data Management
sponsored by DataGravity
RESOURCE CENTER: This white paper shows you a new way to store data: data-aware storage. This storage architecture combines state-of-the-art primary storage with integrated data services to create an entirely new method of storage.
Posted: 09 Feb 2016 | Published: 31 Dec 2015

DataGravity

Advanced Threat Defense
sponsored by Blue Coat Systems
EGUIDE: This e-guide will teach you the steps your business should take to protect against new, more advanced threats.
Posted: 03 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper discusses how a comprehensive internal and external solution can help to protect your perimeter, your core, your endpoints, and everything else in-between. You'll also learn how automating the interaction between prevention, detection, and mitigation and remediation creates an efficient and effective defense strategy.
Posted: 10 Feb 2016 | Published: 11 Jan 2016

Fortinet, Inc.

Insights for a New Chief Data Officer: Define Data Strategy and Align Business Goals
sponsored by IBM
EBOOK: In this e-book, specially designed for aspiring chief data officers (CDOs), discover how to collaborate, prioritize, and spearhead your organization's efforts to put data at the center of the business. Learn new CDO best practices and how you can better support strategic enterprise goals.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

IBM

Top 10 Things You Need to Consider When Buying a Hyper-converged Infrastructure
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper illustrates how to rein in IT complexity and promote increased flexibility and agility in your organization with hyper-converged infrastructure. Read on to be introduced to the 10 most crucial factors to consider when contemplating hyper-convergence to remove resource silos and improve IT.
Posted: 05 Feb 2016 | Published: 30 Jun 2015

Hewlett-Packard Enterprise

Security Operations in the Cloud
sponsored by TrendMicro
WHITE PAPER: This white paper discusses some best practices to adopt in securing workloads in Amazon Web Services.
Posted: 05 Feb 2016 | Published: 31 Jan 2016


Key trends for IT leaders in 2016 - Part 3
sponsored by ComputerWeekly.com
EBOOK: Spencer Izard, head of executive advisory programme at IDC, considers the key CIO and IT leadership trends for 2016 in this PowerPoint presentation given at the January 2016 Computer Weekly CW500 Club meeting.
Posted: 09 Feb 2016 | Published: 10 Feb 2016

ComputerWeekly.com

Defense-In-Depth: Database Securing
sponsored by Oracle Corporation
WHITE PAPER: Today, a DBA can leave work with terabytes of information easily. In this technical primer, you'll find details on ways to control access for your authorized users. Uncover strategies for data theft, SQL injection, and noncompliance prevention.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement