IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

IBM

Cloud Vs. Data Center: Inside Look Into Security
sponsored by CloudPassage
WHITE PAPER: This insightful 35-minute web seminar explores the origin of the myth that data is safer on premise than in the cloud and offers top requirements for security in the cloud.
Posted: 16 Jul 2015 | Published: 31 May 2015

CloudPassage

Logistics Company Leverages 3 ITSM Tools to Increase Process Speeds
sponsored by Matrix42
CASE STUDY: Access this case study to see how a leading logistics service provider leveraged 3 IT service management (ITSM) tools in a single portal without interrupting its mission-critical IT services during the integration.
Posted: 10 Jul 2015 | Published: 31 Dec 2013

Matrix42

Putting the Kibosh on Shadow IT: Best Practices for Hybrid Cloud Management
sponsored by XO Communications
WHITE PAPER: This resource discusses the best ways to implement a hybrid cloud in such a way as to prevent departments from going behind the IT department's back to implement cloud services.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

XO Communications

Self Service – The 6 Most Important Success Factors
sponsored by USU AG
WHITE PAPER: Access this white paper for the six most important success factors of self-service. Learn how to empower your own customers with these self-service tips.
Posted: 21 Jul 2015 | Published: 21 Jul 2015

USU AG

Cyber Risk Report: Data Breaches and the Healthcare Industry
sponsored by SurfWatch Labs
WHITE PAPER: This white paper presents cybercrime statistics and trends that can help you stay secure despite the numerous threats facing the healthcare industry.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

Defend Web Properties from Modern Threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the challenges of defending modern web app properties from modern threats, and discover how you can benefit from deploying an application delivery controller (ADC).
Posted: 27 Jul 2015 | Published: 30 Jan 2015

Citrix

Managing Security Threats in Today's Mobile Enterprise
sponsored by BlackBerry
WEBCAST: This video tackles the issue of mobile security and discusses how, despite the multitude of threats facing mobile devices, you can make sure your enterprise remains secure.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

BlackBerry

Endpoint Security: The Identity and Access Imperatives
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the importance of integrating IAM with your endpoint security measures.
Posted: 17 Jul 2015 | Published: 30 Nov 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement