IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Be the Champion of Security in a DevOps World
sponsored by Veracode, Inc.
VIDEO: There tends to be a gap, both technically and culturally, between what developers are doing and what security is doing, which often creates vulnerabilities. How can we close this gap without turning security into a bottleneck? Watch this webcast to learn how to incorporate security into the DevOps process.
Posted: 15 Jan 2018 | Premiered: 15 Jan 2018

Veracode, Inc.

Rapid Problem Isolation for Applications
sponsored by Oracle Corporation
RESOURCE: Learn about the Oracle App Performance Monitoring Cloud Service for DevOps teams and find out how you can rapidly identify, isolate, triage, diagnose, and resolve app issues before they can impact customers.
Posted: 19 Jan 2018 | Published: 31 Dec 2015

Oracle Corporation

6 Steps to Building a Business Case for Enterprise Architecture
sponsored by Mega International
WHITE PAPER: You know that your company could improve, but how do you build the case that will get your executives to provide the necessary funding? This white paper covers the six steps you need to take in order to build the strongest possible case for using enterprise architecture to transform your business.
Posted: 09 Jan 2018 | Published: 09 Jan 2018

Mega International

Get to Cloud Faster with Converged: Transform Your IT
sponsored by Dell EMC and Intel®
RESOURCE: Download this infographic for a digestible overview on how to deploy private cloud in a fast and efficient manner using converged infrastructure. You'll learn why converged can serve as a reliable foundation for the cloud, how it'll set you up to improve on-demand scalability, accelerate time to market, and more.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Dell EMC and Intel®

How IT Services are Implementing Fastpass Security Tools
sponsored by Fast Pass Corp
CASE STUDY: In this case study, find out how CCBC IT Service successfully reduced calls to the IT Service Desk with a self-service password reset tool. Learn how this strategy helped to maintain current call performance without increasing staffing levels.
Posted: 02 Jan 2018 | Published: 02 Jan 2018

Fast Pass Corp

The Building Security in Maturity Model Examined
sponsored by Synopsys
RESEARCH CONTENT: In this white paper, you'll find the Building Security in Maturity Model (BSIMM) which compiles the information given by 109 security professionals. Read on to learn the important roles found in a successful security initiative, as well as how you contemporaries are managing their compliance policies, testing protocols, analytics, and more.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Synopsys

Your Chance to Get It Right: Five Keys to Building AppSec into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Watch this webcast to learn how to get app security pros involved in the collaborative DevOps culture by helping developers speak their language. You'll find 5 steps your company can take to achieving secure DevOps inside.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Veracode, Inc.

Container Security
sponsored by CloudPassage
RESOURCE: Software containers present a new attack surface and security challenges that traditional security tools aren't designed to solve. This resource offers security and compliance strategies for Docker containers to assist DevOps teams in advancing their traditional security posture.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

CloudPassage

The Business Value of Modernizing Infrastructure with Hyper-Converged Systems
sponsored by Dell EMC and Intel®
WHITE PAPER: In this IDC paper, analysts explain how to use HCI to create more value, growth, and competitive advantage in distributed enterprises. Read on to leverage HCI to provide staff with high-performing business apps and services at non-central locations, reduce impactful outages and unplanned downtime, and more.
Posted: 09 Jan 2018 | Published: 31 Oct 2017

Dell EMC and Intel®
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement