IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Pager Spam

RSS Feed    Add to Google    Add to My Yahoo!
Pager Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Case Study: KAS Bank Secures High-value Transactions with Strong Authentication
sponsored by HID
CASE STUDY: This case study examines security challenges for a European bank with the shift to on line transactions. Read on to find out how they implemented a strategy that delivered the highest level of security with a reusable infrastructure.
Posted: 23 Jul 2015 | Published: 25 Mar 2013

HID

The Future of Workload Automation in the Application Economy
sponsored by CA Technologies.
WHITE PAPER: This white paper offers a workload automation maturity chart to explore the benefits of an optimal workload automation tool.
Posted: 13 Jul 2015 | Published: 31 Dec 2014

CA Technologies.

Geek Guide: Apache Web Servers and SSL Authentication
sponsored by GeoTrust, Inc.
WHITE PAPER: This guide walks through what SSL/TLS is (and isn't), how you can create or buy a certificate, how to install that certificate into an Apache server and then how to configure Apache such that a subset of URLs on your system are covered by SSL.
Posted: 15 Jul 2015 | Published: 01 Jul 2015

GeoTrust, Inc.

Taking Windows Mobile on Any Device
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about an application virtualization platform that centralizes and virtualizes Windows apps and desktops in the data center and deliver high-performance, secure access to them from any type of mobile device, at any time.
Posted: 13 Jul 2015 | Published: 30 Apr 2015

Citrix

How Unified Workload Automation Enables IT Staff Productivity
sponsored by CA Technologies.
WHITE PAPER: This white paper explores a unified workload automation system that offers visibility, enables efficiency, and boosts productivity.
Posted: 14 Jul 2015 | Published: 31 Dec 2014

CA Technologies.

How to Make Android Work For Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper walks you through how to customize the Android security and management capabilities to your company's mobile strategy.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

IBM

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
PODCAST: In this Podcast, you'll find firsthand accounts of the tactics used by cybercriminals from none other than Don Smith, Technology Director for a leader in information security systems. Heighten your awareness of spear phishing and other common attacks that lead to security breaches.
Posted: 10 Jul 2015 | Premiered: Jul 10, 2015

Dell SecureWorks

8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

NetScaler and XenMobile Solution for Enterprise Mobility Deployment Guide
sponsored by Citrix
PRODUCT LITERATURE: This deployment guide carefully explains how you should go about your setting up your NetScaler and ZenMobile to optimize enterprise mobility in your organization.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement