IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Beyond one person, one desk, one device
sponsored by Citrix
WHITE PAPER: Access this white paper to learn how local councils are adopting virtual desktop solutions to transform their organizations. Also, discover a list of important considerations when assessing alternative virtual desktop solutions.
Posted: 31 Jul 2015 | Published: 30 Apr 2014

Citrix

Case Study: KAS Bank Secures High-value Transactions with Strong Authentication
sponsored by HID
CASE STUDY: This case study examines security challenges for a European bank with the shift to on line transactions. Read on to find out how they implemented a strategy that delivered the highest level of security with a reusable infrastructure.
Posted: 23 Jul 2015 | Published: 25 Mar 2013

HID

From Project to Product
sponsored by Red Hat
WHITE PAPER: Software developed by an open source community with testing, certification, documentation, training and support can help IT organizations experience lower middleware with total cost of ownership and risk. Read this white paper to learn about the benefits of open source technology.
Posted: 03 Aug 2015 | Published: 31 Dec 2014

Red Hat

Defend Web Properties from Modern Threats with Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the challenges of defending modern web app properties from modern threats, and discover how you can benefit from deploying an application delivery controller (ADC).
Posted: 27 Jul 2015 | Published: 30 Jan 2015

Citrix

Business-Critical Documents: Printing You Can Count On
sponsored by Nuance
WHITE PAPER: Improving your cost-effective printing is crucial. Whether printing from a desktop, mobile device or back office system, you can ensure critical and confidential documents are printed at the right place and time.
Posted: 28 Jul 2015 | Published: 27 Sep 2014

Nuance

Detect Threats in Real Time with SaaS Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: This brochure describes how a cloud-based platform can enhance your endpoint security capabilities.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

CrowdStrike

Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

IBM

Your Guide to Building a Successful MSP Business
sponsored by Solarwinds N-able
WHITE PAPER: This detailed white paper delves into 4 requirements for building a profitable MSP business and explores a program to help you get started and achieve your business objectives.
Posted: 24 Jul 2015 | Published: 30 Jun 2015

Solarwinds N-able

Unprecedented Insight into Operational Risks
sponsored by IBM
WEBCAST: This webcast explores how to assess risks and controls across the enterprise and delve deeper to review specific business processes within each department. You'll learn how to expose risks that leave your organization vulnerable to losses. View now to discover how to improve risk management.
Posted: 31 Jul 2015 | Premiered: Feb 3, 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement