IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Delivering Enterprise Value with Service Management
sponsored by ServiceNow
WHITE PAPER: This white paper analyzes a modern service management platform, discussing how new IT trends have forced service management to change.
Posted: 28 Aug 2015 | Published: 31 Mar 2015

ServiceNow

IT Advancements: Quantifying the Business Value of Nutanix Solutions
sponsored by Nutanix
WHITE PAPER: In this white paper, you will learn why organizations running workloads on hyperconverged infrastructure benefit from strong application performance. Read on here to implement advanced infrastructure solutions in your business.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Nutanix

Get Connected: A Checklist for a Smarter, More Effective Government
sponsored by Lenovo and Microsoft
WHITE PAPER: Access the following white paper for an exclusive checklist that will help guide you to create a smarter, more effective government.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Lenovo and Microsoft

Improve IT Agility and Efficiency: An Analysis of Large Data Brings Fresh Insights into Operation
sponsored by IBM
WHITE PAPER: In this white paper, you'll uncover how real-time, historical, and embedded search analytics are helping IT pinpoint massive amounts of data to find and resolve problems faster.
Posted: 28 Aug 2015 | Published: 28 Feb 2014

IBM

The Anatomy of a Connected Government
sponsored by Lenovo and Microsoft
WHITE PAPER: Download this infographic, sponsored by Lenovo® and Microsoft, and see for yourself how the right devices power and underpin the ongoing success of today's connected governments—and how they can do the same for you and your agency.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Lenovo and Microsoft

How to Get Bullet-Proof Grade Enterprise Email Protection
sponsored by LogicNow
WHITE PAPER: This white paper outlines a defense strategy for employing a third-party system to complement your email provider's security protection. Read on to add an additional line of defense to your business' email service to combat the melting pot of internet threats.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

LogicNow

5 Super Powers To Look for When Evaluating DRaaS Providers
sponsored by Assuritive
WHITE PAPER: This white paper outlines and examines the five most indispensable attributes to look for when assessing DRaaS solutions. Read on here to learn how to evaluate using 5 criteria.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Assuritive

Industry Best DNS-Based DDoS Protections
sponsored by Nominum, Inc.
WHITE PAPER: In this white paper, you'll learn why better DNS defenses are needed to mitigate advanced and evolving bot-based malware and DDoS attacks.
Posted: 28 Aug 2015 | Published: 19 Aug 2015

Nominum, Inc.

Success in the Digital Banking Revolution: How to Securely Go Mobile
sponsored by HID
WEBCAST: In the first part of this two-part webcast, Christy Serrato, in Solutions Marketing at HID Global, addresses the challenges organizations face in the new era of digital banking, as well as discusses the barriers to mobile banking adoption, including coping with outdated legacy software integration.
Posted: 24 Aug 2015 | Premiered: Aug 24, 2015

HID
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement