IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam Reports
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Best Practices for Endpoint Security Software and Devices
sponsored by BitDefender
EGUIDE: Access this expert guide for detailed advice on purchasing the right endpoint security solution, implementing endpoint security best practices, and more.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Deliver Apps Faster with PaaS Strategies
sponsored by Red Hat
WHITE PAPER: Access this infographic and learn how to give DevOps teams the tools they need to create and deploy apps at the pace of business.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Red Hat

Automated ITSM Enhances E-Government Services
sponsored by Hewlett-Packard Enterprise
CASE STUDY: This case study delves into how ictQATAR leveraged an automated IT service management (ITSM) strategy to support their vision of more efficient and accessible e-government services.
Posted: 16 Nov 2015 | Published: 31 Dec 2014

Hewlett-Packard Enterprise

Five Reasons Your Business Needs Cloud
sponsored by Cintra/Oracle
WHITE PAPER: This white paper discusses 4 major ways that cloud technology can help your enterprise be responsive, innovative, and efficient. Learn how implementing a cloud-enabled IT architecture can help your enterprise provide better customer experiences, improve IT responsiveness and agility, operate efficiently and cost-effectively, and more.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Continuous Security and Reliability in Iterative Development
sponsored by
WHITE PAPER: Access this white paper to understand the new approaches to security required in a continuous deployment environment.
Posted: 20 Nov 2015 | Published: 31 Dec 2014

Secure Your Private Cloud Infrastructure
sponsored by Oracle Corporation
WEBCAST: In this webcast, take a closer look at one private cloud infrastructure and how it can help you protect your sensitive data.
Posted: 17 Nov 2015 | Premiered: Nov 11, 2015

Oracle Corporation

Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Check Point Software Technologies Ltd.

Dow Corning Uses Classifications Labels to Help Protect Intellectual Property
sponsored by TITUS
WHITE PAPER: This short case study shows how one multinational company deployed an enterprise-wide classification management system which had the power to easily control document access.
Posted: 16 Nov 2015 | Published: 16 Nov 2015


Transforming Business Processes with Agile Integrated Platforms
sponsored by SAP
WHITE PAPER: In the following white paper, uncover the importance of choosing the right agile integrated cloud vendor and learn about a system that promises to bring the agility, flexibility, and functionality needed to remain competitive now and in the future. Access now to learn more.
Posted: 19 Nov 2015 | Published: 19 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement