IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Powering Disaster Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: In this white paper, you will learn more about the challenges organizations face with it comes to DR, and how the cloud can come to the rescue of your organization. Read on to find out how to securely store customer data in the public cloud while fending off security concerns.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Keep Data Secure in Today's High-Risk Environment
sponsored by Hewlett-Packard Limited
VIDEO: This video discusses how you can adopt data protection that provides the security you need in today's high-risk environment.
Posted: 25 Aug 2015 | Premiered: 31 Dec 2014

Hewlett-Packard Limited

The Anatomy of a Connected Government
sponsored by Lenovo and Microsoft
WHITE PAPER: Download this infographic, sponsored by Lenovo® and Microsoft, and see for yourself how the right devices power and underpin the ongoing success of today's connected governments—and how they can do the same for you and your agency.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Lenovo and Microsoft

A Cross-Platform Approach to IT
sponsored by Lenovo & Intel
WHITE PAPER: There are many benefits to taking a cross-platform approach to IT. You can read more about them in the following Cross-Platform Transformation eGuide by Lenovo® and Intel®.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Lenovo & Intel

The Executive Buyer’s Guide to Project Portfolio Management
sponsored by Innotas
WHITE PAPER: This white paper discusses the trends in project portfolio management, as well as the business case for why it will be critical to your enterprise and suggestions for choosing the right solution.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Innotas

Bullet-proofing Office 365 Security
sponsored by ControlEmail
WHITE PAPER: In this white paper, you'll learn how to augment cloud-based email security to defend against the top threats such as phishing and malware infection.
Posted: 26 Aug 2015 | Published: 29 Jul 2015

ControlEmail

Time to Rebuild Your IT Infrastructure Security Policy
sponsored by VMware
EGUIDE: Access this exclusive e-guide to learn from the experts why IT security has taken a backseat to other IT initiatives and why you shouldn't wait to address security policy issues.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

VMware

Threats Will Get In: What Will You Do About Them?
sponsored by Splunk
VIDEO: This brief video explains the necessity of adjusting your security strategy to focus more on detecting and mitigating threats.
Posted: 21 Aug 2015 | Premiered: 02 Jul 2014

Splunk

Achieve Immediate Value from your ITSM Investment, Without the Hassle
sponsored by Unisys
WHITE PAPER: This white paper offers the information you need to install, manage, maintain and optimize your ITSM application management investment. Learn how to achieve the lowest possible total cost of ownership and the highest level of availability.
Posted: 26 Aug 2015 | Published: 30 Jun 2015

Unisys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement