IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone SpamReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Infographic: SSD vs. HDDs- How Do they compare?
sponsored by SanDisk Corporation
RESOURCE: Access this infographic to see solid state drives compared side by side with hard disks.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

SanDisk Corporation

StruxureWare for Data Centers - A Hollistic View for Your Team
sponsored by Schneider Electric
VIDEO: View this video to learn about a data center infrastructure management suite to give your team a holistic view across your facility. Control your data center performance and monitor the equipment's ROI, CAPEX, and OPEX through intuitive applications.
Posted: 17 Nov 2014 | Premiered: 12 Apr 2013

Schneider Electric

CIO Guide - Banishing security threats from your business
sponsored by Clearswift
EGUIDE: In this expert e-guide, learn ways to motivate your IT staff to creat and innovate through reward and praise. Delve into the growing risks of BYOD and how to avoid the pitfalls to enable users the freedom they seek.
Posted: 18 Nov 2014 | Published: 01 Oct 2014

Clearswift

Beyond Shadow IT: A Proactive Approach to Reducing Risk While Embracing Cloud Services
sponsored by SkyHigh
WHITE PAPER: This exclusive whitepaper will teach you how to address shadow IT to ensure a stable, secure cloud environment.
Posted: 18 Nov 2014 | Published: 18 Nov 2014

SkyHigh

Predicting Attack Paths Within Your Networks
sponsored by Tenable Network Security
WHITE PAPER: This white paper describes how one company's advanced security solutions can be leveraged to identify systems within your networks that are vulnerable to exploitation.
Posted: 12 Nov 2014 | Published: 23 Oct 2014

Tenable Network Security

Info-Tech Research declares IBM a Champion in Systems Management
sponsored by IBM
WHITE PAPER: Access this guide to examine an evaluation of 13 competitors in the systems management market. You'll be able to compare products based on functionality and price and get insight into where the market is going. On top of this, you'll learn what sets IBM apart from the competition in the systems management market.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

IBM

4 Steps to Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this brief whitepaper to find out the four steps to security intelligence.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Hewlett-Packard Company

Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

Ponemon Cost of Cyber Crime Study: Global Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 19 Nov 2014 | Published: 31 Oct 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement