IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

How Five IT Leaders Transformed Their Businesses With Cloud Communications
sponsored by 8x8, Inc.
WHITE PAPER: Access this white paper to find out how five companies improved their communications using CaaS.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

8x8, Inc.

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
sponsored by GeoTrust, Inc.
EGUIDE: This expert e-guide walks you through the importance of trusted certificates and the roles that Certificate Authorities (CAs) play. View now to explore the web security threat landscape and to learn the fine print about SSL and certificates.
Posted: 15 Apr 2015 | Published: 10 Dec 2014

GeoTrust, Inc.

A Holistic Approach to Reduce Risk and Improve Mainframe Security
sponsored by IBM
EGUIDE: This extensive technical guide outlines the steps to take to closing mainframe vulnerability gaps. View now to avoid configuring an insecure security strategy.
Posted: 13 Apr 2015 | Published: 04 Dec 2014

IBM

5 keys to transforming your business for speed, agility and innovation
sponsored by Axway
WHITE PAPER: Read this white paper to find out how to create an IT architecture for the digital business era and develop and deploy innovative digital business applications.
Posted: 14 Apr 2015 | Published: 23 Feb 2015

Axway

A new path to remote IT support that makes the branch offices happier
sponsored by RES Software
EGUIDE: This expert e-guide explains why architecting a new platform that meets everyone's needs is vital for today's organizations. Find out how the focus should be on data centralization and explore platforms that are providing the access remote employees want with the support IT can manage.
Posted: 15 Apr 2015 | Published: 15 Apr 2015

RES Software

Point-of-Sale Security for Dummies
sponsored by Bit9 + Carbon Black
RESOURCE: Access this popular resource to find out how you can protect transactions at the point of sale.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Bit9 + Carbon Black

Confident and Careful: The Security Benefits of the Cloud
sponsored by IBM
WHITE PAPER: In this infographic, discover why cloud security services could be the answer to your organization's needs.
Posted: 17 Apr 2015 | Published: 31 Dec 2014

IBM

Enabling Mobile Users and Staying Compliant
sponsored by BlackBerry
WHITE PAPER: Healthcare providers find it difficult enable collaboration and efficient workflows while complying with regulations because of the sensitive information on staff's mobile devices. Find out how a containerization, application-wrapping, and secure connectivity option can bring healthcare organizations a higher level of control and security.
Posted: 15 Apr 2015 | Published: 31 Dec 2014

BlackBerry

Don’t let crime rule your network – building an efficient cyber crime strategy
sponsored by Hewlett-Packard Limited
WHITE PAPER: Featuring input from expert analysts with years of experience, this white paper presents a series of guidelines for creating security that can survive the modern threat landscape.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement