IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Report: Your Guide to Today's Healthcare Threat Landscape
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Uncover 6 threats to your healthcare organization and how they have evolved over the past year, what specific dangers they pose to your healthcare organization, and what you can do to mitigate their harm.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Symantec & Blue Coat Systems

Are Cloud Managed Services The Right Financial Choice for Your Business? Talk to Your CFO
sponsored by IBM
ANALYST REPORT: CIOs and CFOs are coming together to better understand how their cloud managed services decisions impact their business' bottom lines, rather than just the IT department's budget. Access this analyst report to see what each perspective brings to the table and how they empower each other in the decision-making process.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

IBM

Endpoint Visibility: Prerequisite for Today's Security
sponsored by Aruba Networks
WHITE PAPER: With the billions of IoT devices expected to connect to networks in the next 3 years, and the well-publicized security breaches of late, there is a warranted demand among IT pros for real-time visibility and reporting. Learn how continuous monitoring and profiling of connected devices could be your ticket to modern endpoint security.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

Aruba Networks

The Challenge: Aligning IT with Business Objectives
sponsored by Hosting.com
EBOOK: Open this e-book to discover whether or not your IT and business objectives are in alignment, as well as some tips on how to make this happen.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Hosting.com

3 Ways Text Messaging Exposes Your Company to Massive Risk
sponsored by Smarsh
WHITE PAPER: Organizations often don't consider retention and oversight of texts, which exposes them to significant risk for compliance and litigation. Discover 3 massive risks for your enterprise carried by texting, and how to mitigate.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Smarsh

How to Detect & Respond to a Petya Ransomware Attack
sponsored by AlienVault
WHITE PAPER: On June 207th 2017, a new "Petya-like" form of ransomware hit everything from governments to pharmaceutical companies across the globe. Access this white paper to learn the 5 things we know for sure about this new threat, 5 steps to can take to respond to it, as well as a unified security management suite to help in your fight.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

AlienVault

Crash Overdrive: A Proof-of-Concept or a Demonstration of Capability?
sponsored by Booz Allen Hamilton
CASE STUDY: The malware strain referred to as Crash Override caused an hour-long blackout for 20% of Kiev in December 2016. Learn what was discovered about Crash Override and answer questions about why it was deployed, what it means to secure critical infrastructure, and more.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Booz Allen Hamilton

Automating Your Corporate Mobility Management
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast, discover how the mobile workforce is impacting corporate mobility management needs, and costs, and how enterprises are addressing this challenge with an automated mobility management platform.
Posted: 28 Jun 2017 | Premiered: Jun 22, 2017

Cisco Systems, Inc.

Securing the Evolving Enterprise Network: Inside and Out
sponsored by Aruba Networks
WHITE PAPER: What is tue current state of network security and how can it be improved? This paper from the Enterprise Strategy Group answers this by surveying current network security needs and the problems causing them, as well as why you should consider "closed-loop" network security.
Posted: 28 Jun 2017 | Published: 28 Apr 2017

Aruba Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement