IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile SpamReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Protection Storage Architecture: What, Why, and How?
sponsored by EMC Corporation
WHITE PAPER: This white paper explores how a Protection Storage Architecture enables backup teams to solve immediate tactical challenges, helps IT teams keep business applications running, and supports them as they evolve to support strategic services-oriented business models.
Posted: 19 Nov 2014 | Published: 28 Feb 2014

EMC Corporation

Enterprise Software Security Strategies Pulse Report (SSA)
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions.
Posted: 18 Nov 2014 | Published: 31 Oct 2014

Hewlett-Packard Company

How to Protect Critical Data while Maintaining Ease of Use
sponsored by Gemalto
WHITE PAPER: This exclusive whitepaper explores how you can strike a balance between security and convenience.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

Gemalto

4 Steps to Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this brief whitepaper to find out the four steps to security intelligence.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Hewlett-Packard Company

2014 Global Report on the Cost of Cyber Crime
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 18 Nov 2014 | Published: 31 Oct 2014

Hewlett-Packard Company

Infographic: SSD vs. HDDs- How Do they compare?
sponsored by SanDisk Corporation
RESOURCE: Access this infographic to see solid state drives compared side by side with hard disks.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

SanDisk Corporation

Raise Backup Success Rates with Data Protection Assessments
sponsored by APTARE
WHITE PAPER: This exclusive whitepaper argues for implementing comprehensive data protection assessments to improve your backup success rates.
Posted: 18 Nov 2014 | Published: 13 Nov 2008

APTARE

Take Control Over Your Application Performance
sponsored by Citrix
WHITE PAPER: This white paper highlights a solution that can help you overcome 9 key datacenter and cloud architecture challenges.
Posted: 18 Nov 2014 | Published: 30 Jun 2014

Citrix

Mobile Security: Are You At Risk (Yet)?
sponsored by Zimperium
WHITE PAPER: This exclusive white paper takes an in-depth look at the changing enterprise mobility landscape. It offers a look at current mobile security strategies and the evolution of them in years to come. Read on to learn more.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Zimperium
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement