IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone SpamReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Lumension 2014 Data Protection Maturity Report
sponsored by Lumension
WHITE PAPER: This report focuses on top security trends for 2014 and reveals the best practices for safeguarding sensitive information.
Posted: 26 Aug 2014 | Published: 30 Jan 2014

Lumension

MDM: Seperate Work from Play
sponsored by Fiberlink
DATA SHEET: Along with the BYOD era comes issues with security and app integration.  Since each mobile device is different, secure document sharing can be tricky.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Fiberlink

Deliver Optimized Mission-Critical Workloads in Enterprise Data Centers
sponsored by Dell, Inc.
ANALYST REPORT: In this white paper, discover the benefits of working with vendors that can support mission-critical workloads for cloud computing, mobility, and data analytics initiatives in today's data centers. Plus, learn about new suites of hardware and software with integrated support and management capabilities.
Posted: 31 Aug 2014 | Published: 31 Jul 2014

Dell, Inc.

Be Ready for Cyber-Attacks with New Endpoint Security and Monitoring Solutions
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this helpful white paper, uncover a new endpoint threat detection platform that can prepare your organization to fight back against inevitable cyber-attacks.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Bit9 + Carbon Black

ITIL® 2015 and Beyond: Six Trends Driving the Increased Importance of the Service Desk
sponsored by Global Knowledge
WHITE PAPER: This white paper provides a snapshot of challenges for IT service and support and explains why the Service Desk is now more critical than ever.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Global Knowledge

Control Your of your Technology Infrastructure with HP OneView for VMware vCenter
sponsored by HP and VMware
WHITE PAPER: This white paper explores a unified management solution that enables you to take the next step toward the SDDC by allowing virtualization administrators to automate control of HP compute, store, and networking resources without detailed knowledge of each device.
Posted: 29 Aug 2014 | Published: 30 Jun 2014

HP and VMware

Sizing Up IT Operations Management: 3 Points
sponsored by VMTurbo
WHITE PAPER: This exclusive whitepaper covers the transformation you must make to IT operations in order to keep up with virtualization.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

VMTurbo

App Security: Decompiling Android APK Files
sponsored by CDW Corporation
EGUIDE: In this informative e-guide, expert Andrew Hogg takes you through the steps of reverse-engineering Android applications for the purpose of scoping out security weaknesses.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

Countering Cyber Threats with Behavioral Analytics
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement