IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone SpamReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

How to Meet the Growing Demands on IT: Four Steps Along the Path
sponsored by Rackspace
WHITE PAPER: Read this white paper to uncover how outsourcing opens up possibilities for your IT staff to work on more strategic projects while increasing business agility. Discover the four configurations for managing your IT staff and how to transform them into service brokers to advance your organization.
Posted: 17 Nov 2014 | Published: 11 Jul 2014

Rackspace

Protecting your Executives and Important Information from Risk
sponsored by Gemalto
WHITE PAPER: Check out this exclusive whitepaper for an overview of protecting executive-level information and uncover some ways to simplify management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

CIO Guide - Banishing security threats from your business
sponsored by Clearswift
EGUIDE: In this expert e-guide, learn ways to motivate your IT staff to creat and innovate through reward and praise. Delve into the growing risks of BYOD and how to avoid the pitfalls to enable users the freedom they seek.
Posted: 18 Nov 2014 | Published: 01 Oct 2014

Clearswift

Identity and Access Management (IAM) in the Cloud
sponsored by DLT Solutions
EGUIDE: This expert e-guide explores the growing market for cloud-based identity and access management.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

DLT Solutions

Rethinking People Costs in Enterprise IT
sponsored by Rackspace
WHITE PAPER: Explore this white paper and discover new options and avenues to reallocating people costs more strategically. Tackle customer-facing technologies without increasing your spending by making your IT members partners in the experience.
Posted: 13 Nov 2014 | Published: 11 Jul 2014

Rackspace

Weighing Risk Against the Total Cost of a Data Breach
sponsored by Akamai Technologies
WHITE PAPER: This white paper provides an approach to determine the risk of web application cyber-attacks that could potentially affect your company.
Posted: 11 Nov 2014 | Published: 01 Aug 2014

Akamai Technologies

How to increase productivity and ensure the compliance & security of Citrix XenMobile and ShareFile
sponsored by Citrix Ready and eG Innovations
WEBCAST: In this webcast, take an in-depth look at enterprise mobility and security with IT professionals from Citrix Ready and eG Innovations.
Posted: 17 Nov 2014 | Premiered: Nov 17, 2014

Citrix Ready and eG Innovations

PCI DSS Cloud Compliance Requirements
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper serves as a cheat sheet to the ins-and-outs of the payment card industry data security standard.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

SkyHigh

10 Steps for Implementing Strong Authentication in your Organization
sponsored by Gemalto
WHITE PAPER: This important whitepaper covers 10 crucial steps you must take to implement strong authentication in your organization.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement