IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile SpamReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Providing Security for Software Systems in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper details risks to software deployed in the cloud and explores the steps that your organization can take to mitigate those risks.
Posted: 18 Nov 2014 | Published: 30 May 2014

Hewlett-Packard Company

Cities and Counties Share Keys to Virtual Desktop Success
sponsored by Unidesk Corporation
WEBCAST: Access this video to explore the reasons for IT administrators from cities and countries from across the country to implement VDI projects and how the benefits changed their IT and the delivery of vital government services.
Posted: 26 Nov 2014 | Premiered: May 15, 2014

Unidesk Corporation

2014 Cost of Cyber Crime Study: Australia
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive whitepaper explores the economic impact of cyber-crime on Australia in 2014.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

Protection Storage Architecture: What, Why, and How?
sponsored by EMC Corporation
WHITE PAPER: This white paper explores how a Protection Storage Architecture enables backup teams to solve immediate tactical challenges, helps IT teams keep business applications running, and supports them as they evolve to support strategic services-oriented business models.
Posted: 19 Nov 2014 | Published: 28 Feb 2014

EMC Corporation

The Economic Impact of AdvancedPersistent Threats
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores the financial impact of advanced persistent threats by detailing the results of a study of 755 IT and IT security practitioners.
Posted: 20 Nov 2014 | Published: 13 May 2014

IBM

Achieving Control Over Data Center Implementations and Operations
sponsored by Avocent
WHITE PAPER: Access this white paper to learn how certain data center management solutions can provide both access control and holistic monitoring services to ensure reliable, secure, and cost effective data center implementations.
Posted: 24 Nov 2014 | Published: 31 Jul 2010

Avocent

Ponemon Cost of Cyber Crime Study: Global Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

The Big Data Self-Service Desk
sponsored by Hewlett-Packard Company
WHITE PAPER: View this white paper to learn how you can connect business intelligence by leveraging deeply embedded big data. You can provide a self-service portal fueled by captured social conversations to empower users to help themselves and others, reducing the number of tickets IT sees.
Posted: 25 Nov 2014 | Published: 18 Jun 2014

Hewlett-Packard Company

Stuck in a SIEM Rut?
sponsored by LogRhythm, Inc.
EGUIDE: This expert e-guide will help you make sure your security information and event management solution is improving your security posture.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement