IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Phone Spam Reports
 
Today's Mobile Enterprise: The Need for A New Network Security Strategy
sponsored by Aruba Networks
WHITE PAPER: Network security is failing to keep up with the rapid influx of mobile devices. Security professionals have realized that BYOD, mobility and cloud are exposing flaws in network security architectures. This vendor-neutral resource highlights how your enterprise can mitigate risk effectively in this type of dynamic environment.
Posted: 22 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Top 10 IoT Technologies for 2017 and 2018
sponsored by Gartner
WHITE PAPER: This feature analysis from Gartner, discusses 10 technologies that will be vital for organizations to unlock the full potential of the IoT as part of their digital business strategies in the future. Download now to access information on – when these technologies will become relevant, who will be impacted and some of the cautions to be mindful of.
Posted: 14 Jul 2016 | Published: 22 Jan 2016

Gartner

Secure, Scalable Collaboration with Predictable GPU Acceleration and Low TCO
sponsored by AMD
WHITE PAPER: Discover how manufacturers can stay competitive in today's economy with VDI powered by hardware-based GPU virtualization technology and see benefits including empowering mobility and collaboration, safeguarding sensitive data, efficient IT management, and more.
Posted: 22 Jul 2016 | Published: 30 Jun 2016

AMD

Workspace-as-a-Service:Evaluation Criteria for Workspace Aggregators
sponsored by Matrix42
WHITE PAPER: This feature white paper expands on technology-independent solutions that allow IT managers to better manage the end user, as it allows for a single identity to be used across all SaaS deployments and Web apps. Read on to learn more about this system.
Posted: 13 Jul 2016 | Published: 08 Jul 2015

Matrix42

Securing Agile IT: Common Pitfalls, Best Practices and Surprises
sponsored by CloudPassage
WEBCAST: Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general such as security as a "secondary layer", removing layers from the bottom up, reducing attack surface, and more.
Posted: 18 Jul 2016 | Premiered: Jun 23, 2016

CloudPassage

When Buying Converged Infrastructures Makes Sense
sponsored by Dell, Inc.
EGUIDE: In this expert e-guide examine the various considerations to take into account prior to deploying a converged infrastructure.
Posted: 14 Jul 2016 | Published: 26 Feb 2015

Dell, Inc.

Working With HR on Digital Workplace Initiatives
sponsored by Gartner
WHITE PAPER: Find out the key challenges and recommendations for smoothly transitioning to today's digital economy with digital workplace initiatives in this Gartner report. Explore how to partner with your HR department to evolve technology practices systematically to streamline the employee experience.
Posted: 21 Jul 2016 | Published: 20 Mar 2015

Gartner

How Industry Collaboration Mitigates Cybersecurity Risks
sponsored by LogRhythm, Inc.
WHITE PAPER: Discover in this white paper how APAC business leaders can actively share cybersecurity resources, expertise, and best practices to collectively build defenses. Read on to learn how to integrate cybersecurity into HR policies, expansion strategies, staff training processes, and more.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

You can't Secure what you can't see
sponsored by Splunk
ANALYST BRIEF: Gain visibility across your AWS environment.
Posted: 19 Jul 2016 | Published: 19 Jul 2016

TOPICS:  IT Management
Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement