IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone SpamReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

The Convergence of Security and Compliance
sponsored by Bit9, Inc.
WHITE PAPER: This eBook defines potential compliance and security gaps; identifies what effect these gaps can have on your organization; and reveals how a positive solution can close these gaps to ensure the security of servers and endpoints, and help to ensure compliance with industry regulations.
Posted: 16 Dec 2014 | Published: 31 Jul 2014

Bit9, Inc.

Why Attack Intelligence Matters
sponsored by Core Security Technologies
WHITE PAPER: Continue on to this informative white paper to learn how attack intelligence can analyze your vulnerability data, security events, and configuration data to give you a concise view of the attack paths to your most critical data.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Core Security Technologies

6 Vulnerabilities of the Retail Payment Ecosystem
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper explains the risks involved in each step of the retail payment process and provides practical solutions for each, including manipulating software updates, exploiting weak passwords, and more.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

SafeNet, Inc.

How Would Self-Reset Password Solutions Impact Enterprises Around the World?
sponsored by Tools4ever
WHITE PAPER: This white paper explores the results of a survey on self-reset password solutions and the impact that they could have on IT helpdesks.
Posted: 08 Dec 2014 | Published: 08 Dec 2014


Protect Your Organization by Thinking Like an Attacker
sponsored by Core Security Technologies
VIDEO: Download this exclusive video now to learn about a solution that helps you think like an attacker while consolidating, prioritizing, and normalizing threats.
Posted: 10 Dec 2014 | Premiered: 10 Dec 2014

Core Security Technologies

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Hewlett-Packard Company

Vectra Networks: X-Series Product Datasheet
sponsored by Vectra Networks
DATA SHEET: This exclusive resource outlines the key benefits of a network security strategy that was able to deliver for organizations today. Read on to learn more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Vectra Networks

Dell HPC: Intelligent Light accelerates research 20X
sponsored by Dell, Inc.
WHITE PAPER: This case study examines how one organization was able to keep up with growing computational fluid dynamics data by leveraging a solution that delivers cloud-based access to dedicated nodes on a Linux based cluster of next level servers. Read on to learn how this approach delivers faster access to high-performance computing resources and more.
Posted: 12 Dec 2014 | Published: 29 Feb 2012

Dell, Inc.

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement