IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam Reports
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Top Drivers Behind Desktop Virtualization Adoption
sponsored by Dell, Microsoft and Citrix
EGUIDE: IT admins usually list several reasons why they use desktop and app virtualization, but one thing they can almost all agree on is that these technologies simplify management. This e-guide highlights TechTarget's Desktop Virtualization Survey detailing the top drivers of desktop and app virtualization.
Posted: 18 Oct 2016 | Published: 14 Oct 2016

Dell, Microsoft and Citrix

User Behavior Analysis in the Cloud
sponsored by Symantec + Blue Coat
WHITE PAPER: Visibility into real-time traffic, the apps users access, and the activity within these apps can help organizations keep risk out of their cloud environments. Learn more about the powerful combination of machine learning and cloud computing.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

Symantec + Blue Coat

The Anatomy of Today's Top Cybersecurity Fields
sponsored by Unisys
WHITE PAPER: Discover detailed breakdowns of top cybersecurity fields including research and development, federal information technology governance, as well as identity and access management. Learn how to address threats, recognize associated risks, and meet ongoing challenges in the vital threat landscape.
Posted: 12 Oct 2016 | Published: 16 Sep 2016


The Business Value of Printer Security
sponsored by HP
WHITE PAPER: This resource from IDC explores how implementing or increasing you rprinter security can help save money and increase IT efficiency. Learn how to increase security by decommissioning out-of-date devices, balance tight enable all devices with encrypted communications protocols, and more.
Posted: 20 Oct 2016 | Published: 30 Nov 2015


When Your IAM Policy Encounters the Internet of Things
sponsored by Unisys
EGUIDE: Learn how to manage the interactions of identity and access management technology, cloud and virtual environments, and the IoT in your company.
Posted: 17 Oct 2016 | Published: 12 Oct 2016


Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests.
Posted: 18 Oct 2016 | Published: 17 Oct 2016


Going Above and Beyond the 4 Trends Driving the Intelligent PDU Market
sponsored by Chatsworth Products Europe
RESOURCE: Download this resource to tap into the 4 trends driving the intelligent power distribution unit (PDU) market, as evidenced by a data center exec on the front lines of market dynamics.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

Chatsworth Products Europe

The Value of VCE Converged Infrastructure for Data Center Modernization: An Evaluation Guide
sponsored by Dell EMC
ANALYST REPORT: In this Forrester analysis, take a look at the three major characteristics of cloud solutions, as well as factors that are driving movement to the private cloud. Also, learn how set the foundation for evaluating various infrastructure modernization alternatives, such as converged infrastructure.
Posted: 21 Oct 2016 | Published: 31 Mar 2016

Dell EMC

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement