IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Achieve Academic Excellence With Emerging Technology
sponsored by Splunk
ANALYST BRIEF: Learn how one school district provides secure and reliable IT services to support a 21st century learning environment.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

TOPICS:  IT Management
Splunk

5 Questions to Ask Data Protection Vendors
sponsored by Commvault
WHITE PAPER: Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Commvault

‘Maslow’s Hierarchy of Needs’ Adapted to IT
sponsored by Hewlett-Packard Enterprise
RESOURCE: HPE's Keith Hudgell uses the basic model of human needs to build an IT hierarchy of needs. Learn how to get to the top.
Posted: 06 Dec 2016 | Published: 06 Dec 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

Preparing for the Upcoming Retail Season in AWS Practical Tips for Building a World-Class eCommerce Store
sponsored by Relus Technoligies
WEBCAST: This webinar addresses some of the most common reasons why shoppers are leaving online sites, practical steps on how to avoid this from happening including: planning, monitoring, testing and optimization. It also offers advice on how you can prepare and create a cloud environment for the upcoming retail holiday season.
Posted: 09 Dec 2016 | Premiered: Nov 5, 2016

Relus Technoligies

Get Control Over Your Cloud Security
sponsored by LogRhythm, Inc.
WHITE PAPER: You need to have the at least the same level of centralized security analytics for cloud infrastructure and applications as you do for your on-premise tools – if not more. Read on and learn how to monitor your cloud-based infrastructure.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

LogRhythm, Inc.

Reasonable Security Best Practices: Learning From Notable Data Breaches
sponsored by Global Knowledge
WHITE PAPER: Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?
Posted: 01 Dec 2016 | Published: 28 Nov 2016

Global Knowledge

Case Study: How H-E-B Took the Reins of its Email Security
sponsored by Proofpoint, Inc.
CASE STUDY: In this case study learn how HEB Grocery Store came to realize they had an issue with their company email and sought to fix it. Access now to gain helpful insights from HEB's email revitalization initiatives.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Proofpoint, Inc.

Turning Data Protection into a Game Changer for MSPs
sponsored by LogicNow
WHITE PAPER: Learn how to not only manage customers' hardware and software but also their data as well, protecting customer's confidential or regulated data, managing their vulnerabilities and demonstrating the value of these activities in easy to understand formats.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

LogicNow

The Value of Data-Driven Automation to the ITSM Industry
sponsored by LogicNow
WHITE PAPER: In this expert white paper, explores how data-driven automation strategies are starting to change the course of global ITSM delivery, the return on this strategy, and how to figure out if this shift is suitable for your IT infrastructure.
Posted: 07 Dec 2016 | Published: 01 Nov 2016

LogicNow
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement