IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

How to Startup with Hybrid Cloud: 5 Steps to Get Started
sponsored by VMware
WHITE PAPER: This white paper serves as a startup guide, and outlines the top 5 most common ways you can get started when thinking about adopting hybrid cloud. Read on here to find out how you can extend your existing applications and data center, as well as expand critical infrastructure for disaster recovery into the cloud.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

VMware

The Price You Pay for a Data Breach
sponsored by IBM
WHITE PAPER: This research report reveals just how much American businesses stand to lose to a cyber-attack, breaking down costs by industry, enterprise size, and more.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

Email Continuity: Safeguard Email Communications 24/7
sponsored by ControlEmail
WHITE PAPER: This white paper explores email outages and how hosted email continuity can mitigate threats and downtime.
Posted: 27 Aug 2015 | Published: 04 Dec 2014

ControlEmail

Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013

VMware

The Strategic Impact of Mobile Transformation on Business Value
sponsored by VMware, Inc.
WHITE PAPER: This white paper serves as a survey of organizations in education, healthcare, high tech, and retail about the state of their mobile computing efforts. Access this analysis to see three major themes highlighted that are critical for success in mobile transformation.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

VMware, Inc.

An IT Survival Guide: Big Chaos in Small Packages
sponsored by Lenovo and Microsoft
WHITE PAPER: Read the following white paper to learn about the steps you can take to minimize loss or destruction when devices leave work.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Lenovo and Microsoft

Modernize your Enterprise with Effective Analytics Strategies
sponsored by TIBCO Software Inc.
WHITE PAPER: This brief white paper invites you to explore innovative business models and use cases made possible by analytics and data management.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

TIBCO Software Inc.

Endpoint Security is Changing – How Will You Keep Up?
sponsored by Webroot
WEBCAST: This research report uses statistics gathered from security professionals to examine the state of endpoint security today and where it is going in the future.
Posted: 31 Aug 2015 | Premiered: Dec 31, 2014

Webroot

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: To secure Amazon Web Services, users need to do their part by being smart about IAM permissions and AWS security groups.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement