IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Don’t Build a House of Cards The 5 Pillars of Project Portfolio Management
sponsored by Innotas
WHITE PAPER: This white paper discusses the five critical pillars of project portfolio management and how you should think about each of aspect.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Innotas

5 Super Powers To Look for When Evaluating DRaaS Providers
sponsored by Assuritive
WHITE PAPER: This white paper outlines and examines the five most indispensable attributes to look for when assessing DRaaS solutions. Read on here to learn how to evaluate using 5 criteria.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Assuritive

Bullet-proofing Office 365 Security
sponsored by ControlEmail
WHITE PAPER: In this white paper, you'll learn how to augment cloud-based email security to defend against the top threats such as phishing and malware infection.
Posted: 26 Aug 2015 | Published: 29 Jul 2015

ControlEmail

Software-Defined Data Center Meets Micro-Segmentation
sponsored by VMware
WHITE PAPER: This white paper explains how to deploy advanced security inside your data center with micro-segmentation, which will deliver the operational agility of network virtualization.
Posted: 26 Aug 2015 | Published: 13 Dec 2013

VMware

Auditing Your Data for Insider Threats
sponsored by Splunk
WEBCAST: This webcast discusses how, with good network monitoring tools, you can find and detect even the subtlest insider threats.
Posted: 24 Aug 2015 | Premiered: May 14, 2015

Splunk

Your Role in AWS Security
sponsored by SearchAWS
EBOOK: To secure Amazon Web Services, users need to do their part by being smart about IAM permissions and AWS security groups.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

SearchAWS

The Strategic Impact of Mobile Transformation on Business Value
sponsored by VMware, Inc.
WHITE PAPER: This white paper serves as a survey of organizations in education, healthcare, high tech, and retail about the state of their mobile computing efforts. Access this analysis to see three major themes highlighted that are critical for success in mobile transformation.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

VMware, Inc.

A Smarter Solution to Malware Prevention
sponsored by Webroot
WHITE PAPER: This white paper looks at how cloud-driven malware prevention can offer smarter endpoint protection in the face of advanced threats.
Posted: 26 Aug 2015 | Published: 30 Nov 2014

Webroot

What Are Your Virtual Desktop Needs?
sponsored by ComTrade
EGUIDE: Access this exclusive e-guide to discover the pros and cons of virtual desktops. Inside you'll learn about deployment options and four reasons to virtualize your desktops.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

ComTrade
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement