IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
sponsored by Imprivata
WHITE PAPER: Access this white paper to learn about the regulations surround the prescribing of controlled substances, and how to make sure you're complying with regulations.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Imprivata

Solving Remote IT Challenges
sponsored by StorMagic, Inc.
WHITE PAPER: This white paper examines the seven challenges presented by managing remote locations.
Posted: 16 Apr 2015 | Published: 31 Dec 2014

StorMagic, Inc.

The Significance of Windows Server in a Changing IT Landscape
sponsored by Lenovo
EGUIDE: Access this expert e-guide to discover how the changing IT landscape is affecting the role of Microsoft Windows Servers within organizations. Find out how Microsoft is trying to integrate these new market trends by optimizing existing platforms to support cloud, mobile, and virtual machine environments.
Posted: 17 Apr 2015 | Published: 20 Mar 2015

Lenovo

Vulnerability Remediation: If you Ranked It, You Should Have Put a Patch on It
sponsored by White Hat Security
WEBCAST: Access this webcast now for an in-depth review of the various web security vulnerabilities you need to protect yourself from, and also discover a step-by-step guide for remediating these threats. View it now to uncover the truth about web security.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Monitoring the Hybrid Cloud: Evolving to the CloudSOC
sponsored by IBM
WHITE PAPER: In this in-depth white paper, find tips for managing all aspects of cloud computing without sacrificing security monitoring.
Posted: 17 Apr 2015 | Published: 07 Jan 2015

IBM

Thomas Cook Streamlines Departure Control and Cuts Costs
sponsored by Hewlett-Packard Limited
CASE STUDY: This case study explains how a departure control system provides better service to customers and can help you get a leg up against competitors in the market.
Posted: 15 Apr 2015 | Published: 01 Jun 2012

Hewlett-Packard Limited

What Exactly Does AWS Security Protect?
sponsored by Trend Micro
EGUIDE: This exclusive e-guide outlines the differences in responsibilities between application architects and developers and AWS security when securing apps on AWS. Discover expert advice for securing business data and applications in the AWS cloud and find out how AWS partners are continuing to adapt to the pace of innovation of AWS.
Posted: 14 Apr 2015 | Published: 14 Apr 2015

Trend Micro

Mobile Policies: How to Write Guidelines Employees Will Follow
sponsored by BlackBerry
WHITE PAPER: This white paper acts as a template to help you build a mobile computing policy that your employees will understand and follow as you implement a BYOD or COPE strategy.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

BlackBerry

How Five IT Leaders Transformed Their Businesses With Cloud Communications
sponsored by 8x8, Inc.
WHITE PAPER: Access this white paper to find out how five companies improved their communications using CaaS.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

8x8, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement