IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Pager Spam

RSS Feed    Add to Google    Add to My Yahoo!
Pager SpamReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Analyst Report: How 9 Managed Security Service Providers Stack Up
sponsored by IBM
ANALYST REPORT: This Forrester Research, Inc. report identifies 9 managed security services providers (MSSPs) – AT&T, CSC, IBM, and more – that were researched, analyzed, and compared against one another. Explore how each provider stacks up against three categories: current offering, strategy, and market presence.
Posted: 26 Aug 2014 | Published: 26 Mar 2012

IBM

Unified Windows Device Management
sponsored by Fiberlink
WEBCAST: Each entireprise is unique, so you need a flexible yet simple platform to manage your mobile environment. Enterprise IT is in the middle of a shift in how they provide support and do business, and enterprise management needs to do the same.
Posted: 29 Aug 2014 | Premiered: Aug 29, 2014

Fiberlink

IT Service Brokereage - The Intersection of User Experience and Business Technology
sponsored by Hewlett-Packard Company
VIDEO: This exclusive video covers the transformation IT must make as technology evolves and the role IT brokerage can play in these changes.
Posted: 28 Aug 2014 | Premiered: 28 Aug 2014

Hewlett-Packard Company

Sizing Up IT Operations Management: 3 Points
sponsored by VMTurbo
WHITE PAPER: This exclusive whitepaper covers the transformation you must make to IT operations in order to keep up with virtualization.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

VMTurbo

Computer Weekly – 26 August 2014: Can national security and privacy co-exist?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to NSA whistleblower Bill Binney about the often-conflicting needs of security and privacy. We find out how Google is using artificial intelligence to improve datacentre energy efficiency. And we look at a project to use wearable technology and big data to help tackle Parkinson's disease. Read the issue now.
Posted: 26 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Securing the enterprise workspace: protect your organization while supporting mobility and BYOD
sponsored by Dell Software
WHITE PAPER: Discover how to prevent a costly breach while giving employees simple, authorized access to corporate applications and data on a range of mobile devices and operating systems.
Posted: 25 Aug 2014 | Published: 30 Nov 2013

Dell Software

Finding the Security Balance for Virtual Environments
sponsored by Kaspersky Lab
WHITE PAPER: This in-depth white paper will help you identify the right security approach for your virtual environment that won't be a drain your system's performance.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab

Guarding Against a Data Breach
sponsored by Hewlett-Packard Company
WHITE PAPER: In this informative white paper, discover how modern enterprises should respond to growing security threats while balancing economic and organizational concerns.
Posted: 22 Aug 2014 | Published: 31 Jan 2012

Hewlett-Packard Company

7 Essential Practices for Business Continuity Management
sponsored by IBM
WHITE PAPER: In this informative white paper, uncover a tested approach to expanding Business Continuity Management into an integrated, enterprise-wide program.
Posted: 22 Aug 2014 | Published: 30 Apr 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement