IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Pager Spam

RSS Feed    Add to Google    Add to My Yahoo!
Pager Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.
Posted: 16 Oct 2017 | Premiered: May 16, 2016, 01:03 EDT (05:03 GMT)

Check Point Software Technologies Ltd.

Overview of AWS Security - Analytics Services, Mobile and Applications Services
sponsored by Amazon Web Services
WHITE PAPER: Cloud-based analytics services can help your organization process and analyze any volume of data. Download this resource to learn how your organization can benefit from a variety of cloud based analytics and mobile application services, ranging from identity and access management to mobile analytics, and deployment and management services.
Posted: 09 Oct 2017 | Published: 01 Jun 2016

Amazon Web Services

Study: Bank of Ireland Cuts Software Spending for Key Vendors with Snow License Manager
sponsored by Snow Software
CASE STUDY: With 15,000 PCs and 3,500 servers, Bank of Ireland was in need of a new software asset management (SAM) strategy. Read this study to see how they were able to drastically reduce the costs of renewing software licenses, remove unused and duplicated installations, and streamline software procurement.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Snow Software

What it takes for women to succeed in Southeast Asia's IT industry
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the traction that women are gaining in Southeast Asia's IT industry, how one woman went from calculating the strength of molecular bonds to leading a growing business at a Singapore telco, and the story behind a woman's ascent in Malaysia's healthcare IT scene.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

ComputerWeekly.com

Most Wanted Malware: Banking Trojans and Ransomware That Want Your Money
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Read this rundown of the top 10 malwares that tried to steal your money in the summer of 2017.
Posted: 12 Oct 2017 | Published: 19 Sep 2017

Check Point Software Technologies Ltd.

8 Benefits of SSL/TLS Automation
sponsored by Symantec
RESOURCE: In this resource, discover the 8 benefits of SSL/TLS automation to better manage certificate renewals and installations.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Symantec

Digital Workspace Basics E-book
sponsored by VMware
EBOOK: In this e-book, you'll discover the keys to successfully managing digital workspaces. Read on to see instruction for enhancing data loss prevention by reducing your attack surface, creating an intuitively simple user experience across all devices, and more.
Posted: 05 Oct 2017 | Published: 05 Oct 2017

VMware

The Perfect Rx for HIPAA Compliance
sponsored by AlienVault
WHITE PAPER: Complying with HIPAA's Security Rule and to demonstrate that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

A Solution for Managing Privileged Access
sponsored by Devolutions
WHITE PAPER: For IT system admins to access remote servers and virtual machines, the amount of security that they have to go through is a time-eater. You need a privileged access management (PAM) tool. Read on to learn what problems PAM solves, how to implement it, real-world use cases, and more.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Devolutions
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement