IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

5 Steps to Quantifying Insider Risk
sponsored by Veriato, Inc.
WHITE PAPER: Security is a matter of numbers: vague alerts like "we are at risk" do little for the security professional tackling the issue at hand. Learn 4 "insider risk laws", 5 steps to quantifying and addressing insider risk, and more.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Veriato, Inc.

VDI Hardware Evaluation Checklist
sponsored by Pure Storage
EGUIDE: Organizations considering VDI must exercise caution when choosing the hardware on which to run their platform. From this e-guide, learn how to choose the right VDI hardware for your deployment. Read on to access a five-point checklist for selection, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Pure Storage

Efficient, Cost-Effective VDI Expansion on Converged Infrastructure
sponsored by Dell EMC
RESOURCE: Access this IDC research paper to learn how a successful converged infrastructure can increase the reliability, performance, and scalability of your VDI deployments. Extend your virtual desktop environments with system that will support intense graphic apps, deliver higher mobility, and more.
Posted: 24 Apr 2017 | Published: 31 Oct 2016

Dell EMC

Security Report: Transaction Monitoring Optimization
sponsored by SAS
WHITE PAPER: Financial fraudsters are targeting both institutions and consumers of digital services as more and more customers are demanding diverse digital channels. Discover how fraudsters are exploiting these capabilities and learn to fight fraud with customer experience in mind.
Posted: 21 Apr 2017 | Published: 31 Dec 2016

SAS

Cloud Data Management Tailor-Made for Your Business
sponsored by Veritas
WHITE PAPER: A customized strategy for moving data to multiple cloud environments saves time and money, and lowers risk.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

Become GDPR-Ready and Data- Driven with an Expanded Information Management Portfolio
sponsored by Veritas
WHITE PAPER: Discover the growing importance of changing data protection regulations — in particular, the GDPR and how it takes information management out of the IT room and into the boardroom.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

Veritas

Containers Rise to the Challenges of Hybrid IT
sponsored by Red Hat
CASE STUDY: Containers are one way to get software to run reliably when migrating from one environment to another. Access this analyst paper for case studies from two different kinds of organizations that have already benefited significantly from containers.
Posted: 21 Apr 2017 | Published: 30 Dec 2016

Red Hat

GDPR Brings Opportunities for Businesses to Transform
sponsored by Veritas
WHITE PAPER: Learn how embracing GDPR readiness can help your business become more agile and innovative.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

How to Secure Your Digital Experience
sponsored by Oracle Corporation
WEBCAST: Managing identity and access and understanding an individual in context is crucial to obtaining trust in today's constant drive towards adding value and driving innovation in today's IT landscape. Learn how to gain trust, and avoid losing it overnight, in today's threat landscape
Posted: 24 Apr 2017 | Premiered: Apr 19, 2017

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement