IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Push Messaging Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Tolly Test Report: Web Application and  Security Access Manager Appliance
sponsored by IBM
WHITE PAPER: Access this white paper that details a test report of a web security and access manger appliance. Read on to learn how this appliance scored, and find out about the benefits it can provide your company.
Posted: 02 Mar 2015 | Published: 30 Nov 2014

IBM

Delivering user-centric IT solutions that improve workplace productivity
sponsored by Unisys
WHITE PAPER: Access this white paper to discover how workspace-as-a-service is an end-to-end solution to enable the journey from a traditional, device-centric landscape to a future-proof, user-centric landscape and allowing organizations to assemble the best-fit working environment and applications for each user on any device they choose.
Posted: 24 Feb 2015 | Published: 31 Dec 2014


Case Study: Healthcare Company Goes 100% Cloud
sponsored by Dimension Data
VIDEO: In this brief video, learn how an integrated healthcare company completely migrated to a hybrid cloud environment for a more flexible, dynamic, efficient data center.
Posted: 03 Mar 2015 | Premiered: 17 Dec 2014

Dimension Data

The 3 Third Party Software Security Controls
sponsored by Veracode, Inc.
WHITE PAPER: In this informative white paper, you will uncover the three control types to improve information protection when using third party services and products. Read on to learn how these recommended approaches increase risk management practices effectiveness and enable remediation post-production avoidance.
Posted: 02 Mar 2015 | Published: 04 Dec 2014

Veracode, Inc.

Safeguarding Compliance and Remaining Vigilant
sponsored by IBM
VIDEO: Tune into this brief video to learn how to safeguard enterprise compliance and automate processes to reduce costs and manage risk.
Posted: 26 Feb 2015 | Premiered: 07 Jan 2015

IBM

DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: This white paper will help you create a response plan for one of the most widespread threats – DDoS attacks.
Posted: 02 Mar 2015 | Published: 02 Mar 2015

Imperva

Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER: This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Imperva

When Buying Converged Infrastructures Makes Sense
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this expert e-guide examine the various considerations to take into account prior to deploying a converged infrastructure.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Dell, Inc. and Intel®

The Social Collaboration Revolution: Keeping Your Dispersed Enterprise Connected
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the market drivers for unified communications and collaboration in the dispersed workplace and details a technology that has set its sights on revolutionizing the world of social collaboration.
Posted: 26 Oct 2012 | Published: 26 Oct 2012

SearchSecurity.com

Video Conferencing Best Practices: Making the Business Case and Key Tips for a Seamless Deployment
sponsored by SearchSecurity.com
EGUIDE: This e-guide discusses key deployment strategies to help unified communications (UC) pros get started. Uncover the physical components of video conferencing systems, interoperability and standards considerations and how organizations should address video management to ensure a solid quality of service (QoS).
Posted: 05 Apr 2011 | Published: 05 Apr 2011

SearchSecurity.com

Enterprise CIO Decisions: Managing the Mobile Workforce
sponsored by SearchSecurity.com
EZINE: Read this exclusive CIO Enterprise Decisions E-Zine for case studies and expert insight into some of the most prevalent mobile issues facing CIOs today.
Posted: 09 Jul 2012 | Published: 30 Jun 2011

SearchSecurity.com

Pervasive Video Collaboration
sponsored by Polycom, Inc.
WHITE PAPER: Video conferencing is rapidly moving out of the conference room and onto the desktop, smartphone, and tablet.  This puts significantly more stress on the UC environment, but has a ton of great benefits.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

Polycom, Inc.

E-guide: Integrating video conferencing with UC: What you need to consider
sponsored by SearchSecurity.com
EGUIDE: This SearchUnifiedCommunications.com e-guide discusses why video conferencing integration is a logical addition to your UC system and offers best practices for implementation.
Posted: 19 May 2011 | Published: 19 May 2011

SearchSecurity.com

Key Considerations in Moving to Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: This exclusive white paper offers up four crucial considerations to ensure a smooth transition to Office 365 and to allow for the same level of administration, security, and message hygiene you had with your on-premises implementation.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

How Videoconferencing is Changing Unified Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: Organizations are moving beyond justifying videoconferencing based on travel avoidance. Instead, they're interested in enhancing collaboration and improving business outcomes.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

Cisco Systems, Inc.

Special Report on Cisco
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This special nine-page report from Computer Weekly, updated for 2014, analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Can BYOD Best Practices Help Mobile UC Mature in the Enterprise?
sponsored by SearchSecurity.com
EGUIDE: Discover why combining bring your own device (BYOD) with enterprise-grade unified communications (UC) applications is such a challenge for organizations and vendors alike and learn about an alternative that can help your organization enjoy the benefits of BYOD and UC simultaneously.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

SearchSecurity.com

Unified Communications Trends and Challenges: How to Stay on Top
sponsored by SearchSecurity.com
EGUIDE: This e-guide discusses the top trends affecting the unified communication's (UC) market as well as potential UC and IP telephony challenges. Learn what you can do to tackle these issues and stay ahead of the competition.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

SearchSecurity.com

Evolve Your UC Strategy with the Cloud
sponsored by Dimension Data
PRODUCT OVERVIEW: This exclusive white paper offers an in-depth look at the always-changing UC & C market and explains why UCC is something every organization should consider. Read on to learn more.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Dimension Data

Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

Expert ways to maximize security in Exchange
sponsored by SearchDataCenter.com
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

SearchDataCenter.com

What Is the Best Communications Solution for My Business?
sponsored by Comcast
WHITE PAPER: This independent research paper explores the evolution of communications services and technology – from telephony and VoIP to IP trunking and UC – to help you find the best communications solution for your business' needs.
Posted: 01 Mar 2013 | Published: 29 Jul 2011

Comcast

eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008

SearchSecurity.com

Top 5 Reasons You Should Dump Your In-House Email Infrastructure
sponsored by Message Bus
EGUIDE: Access this expert e-guide to find 5 reasons why you should dump your in-house email infrastructure.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

Message Bus

Smart Cities: The anywhere working city
sponsored by ComputerWeekly.com
INFORMATION CENTER: This report from Microsoft presents a vision for the development of smart cities which bring together technology, architecture and people.
Posted: 08 May 2012 | Published: 08 May 2012

ComputerWeekly.com

Wireless Solutions for High Density Wireless
sponsored by Xirrus
WHITE PAPER: This brief resource outlines a smarter solution for high-density wireless networking that can scale to support thousands of simultaneous users and an ever-increasing range of wireless devices. Read on now to learn about the capabilities that make this solution a perfect fit for high-density environments.
Posted: 02 Aug 2013 | Published: 31 Dec 2011

Xirrus

Mobile Device Security Overview
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

SearchSecurity.com

The Role of the User Experience in Video Conferencing
sponsored by Polycom, Inc.
WHITE PAPER: Many organizations today are starting to realize the benefits of video as a collaborative tool in the workplace, and have begun to implement new strategies.  Workers are working remotely all around the world, and videoconferencing can bring everyone together in one place.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

Polycom, Inc.

Build the Infrastructure to Enable the Changing Face of IT
sponsored by Citrix
WHITE PAPER: Check out this expert resource to learn about the top trends and challenges facing your network today. Topics include hybrid software-defined networking, context-aware security, unified communications, and more.
Posted: 10 Sep 2014 | Published: 29 Aug 2014

Citrix

Enterprise Social Tools Need UC Integration to Thrive
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores why enterprise social networking tools need to be integrated with your everyday unified communications (UC) tools to be successful and unveils the benefits such an effort can provide.
Posted: 19 Apr 2013 | Published: 19 Apr 2013

SearchSecurity.com

5 Ways to Strengthen Your Business Through Caller Intelligence
sponsored by Flowroute
WHITE PAPER: This exclusive white paper takes an in-depth look at 5 strategies to take when strengthening your caller intelligence. Read on to learn more.
Posted: 04 Mar 2015 | Published: 04 Mar 2015

Flowroute

CW Buyer's Guide to Enterprise Collaboration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 10-page buyer's guide, Computer Weekly highlights what the IT leader needs to know to decide on the future of the organisation's communications strategy.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

UC and the Evolution of Enterprise Telephony
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide will help readers understand key information about the evolution of enterprise technology, how to prepare the enterprise for mobile telephony, and the value of combing IP telephony (IPT) with unified communications (UC).
Posted: 18 Apr 2013 | Published: 18 Apr 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement