IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

The Cloud Powering the Modern Business and Application
sponsored by Rackspace
WHITE PAPER: This white paper gives you an overview of the 5 pillars for applications in the cloud world. Building software with each of these considerations can result in dramatically increased application performance. However, incorporating even a few of these concepts into your development will allow your application to be more cloud ready.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Rackspace

PowerEdge FX: Workload Defined Infrastructure, Converged
sponsored by Dell, Inc. and Intel®
WHITE PAPER: How can you bridge traditional and software-defined workloads on a single modular IT platform?This white paper explores a new approach to converged infrastructure that gives you the flexibility to tailor converged compute, storage and networking resources to meet specific workload requirements.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Dell, Inc. and Intel®

Using SCCD to Work an Issue
sponsored by IBM
VIDEO: This video explores how you can use SmartCloud Control Desk to work on an issue. View now to get a step-by-step breakdown of the process.
Posted: 24 Feb 2015 | Premiered: 07 Feb 2014

IBM

Mobile and Business Critical Analytics Collide: Be Prepared
sponsored by IBM
WEBCAST: Your analytics strategy needs to adapt to the growth of mobile. Find out how you can take analytics with you anywhere.
Posted: 26 Feb 2015 | Premiered: Feb 26, 2015

TOPICS:  IT Management
IBM

Taking Steps to Protect Financial Mobile Applications from Cybercrime and Malware
sponsored by WhiteCryption
WHITE PAPER: This exclusive white paper takes an in-depth look at how to protect your mobile applications from cybercrime and malware. Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

WhiteCryption

6 Risks Enterprises Face with a Fractured CCI Road Map
sponsored by NetScout Systems, Inc.
WHITE PAPER: Access this white paper to discover six major risks that enterprises face when dealing with a fractured or non- existent CCI road map.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

NetScout Systems, Inc.

10 Ways Everyone Should Approach Cybersecurity in 2015
sponsored by Global Knowledge
WHITE PAPER: This paper reviews key security issues and focuses attention on 10 responses that we all need to adopt in our approach to security in 2015.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Global Knowledge

The Danger from DDoS Increases
sponsored by Neustar®
WHITE PAPER: This survey report tells you everything you need to know about how DDoS attacks have changed and why you should be concerned.
Posted: 19 Feb 2015 | Published: 31 Dec 2014

Neustar®

Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper to learn how to close application vulnerability gaps and mitigate business risk.  Read on to learn more.
Posted: 26 Feb 2015 | Published: 15 Oct 2014

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement