IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Pager Spam

RSS Feed    Add to Google    Add to My Yahoo!
Pager Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Quantitative Analysis of a Prefabricated vs. Traditional Data Center
sponsored by Schneider Electric
WHITE PAPER: In this white paper, you will quantify the capital cost differences between prefabricated vs. traditional data centers, as well as learn why prefabrication does not come at a capex premium. Access this paper to discover the impact of rack density for both designs, and discover a side-by-side architecture comparison between prefab and "stick built".
Posted: 01 Feb 2016 | Published: 01 Feb 2016

Schneider Electric

Security Operations in the Cloud
sponsored by TrendMicro
WHITE PAPER: This white paper discusses some best practices to adopt in securing workloads in Amazon Web Services.
Posted: 05 Feb 2016 | Published: 31 Jan 2016


Insights for a New Chief Data Officer: Define Data Strategy and Align Business Goals
sponsored by IBM
EBOOK: In this e-book specially designed for aspiring CDOs, you will discover how to collaborate, prioritize, and spearhead your organization's efforts to put data at the center of its business. Read on to see new CDO best practices and learn how to support strategic enterprise goals.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

IBM

Financial Sector Threats: 2015 Year in Review
sponsored by Digital Shadows
WHITE PAPER: In this white paper, you will read about threat activity in the financial sector as of 2015. It identifies new threats and includes public incidents of note such as extortion, malware and other sophisticated threats.
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Shadows

Are Energy and Utilities at Risk of a Major Breach?
sponsored by BitSight
WHITE PAPER: This white paper discusses the security performance of six key industry sectors.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

Solving the Right Problem in the Data Center
sponsored by VMTurbo
WHITE PAPER: This white paper discusses the limitations of traditional cloud and virtualization management. It outlines a new approach that enables IT to operate outside of the break-fix loop, preventing degradation in the environment before it starts.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

VMTurbo

Cisco Advanced Malware Protection Leads Again in NSS Test
sponsored by Cisco
WHITE PAPER: In this white paper, you will learn how to reduce both detection time and remediation time. Go beyond point-in-time detection with your security solutions.
Posted: 05 Feb 2016 | Published: 31 Dec 2015

Cisco

40 Question You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

The CISO Role and the Ups and Downs of Cloud Compliance
sponsored by CloudPassage
EGUIDE: In this exclusive e-guide, you will learn about the shifting roles of the chief information security officer (CISO), as well as how to extend cyber and cloud security concerns beyond your IT department to permeate all layers of leadership. Access this guide in addition to see experts highlight the ups and downs of cloud compliance.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

CloudPassage
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement