IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Push Messaging Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Penetration Testing Services Data Sheet
sponsored by IBM
DATA SHEET: Since high-profile data breaches have become routine, a programmatic approach to security testing and vulnerability management is required. This resource details a security service that will document your unique set of requirements for determining risk and create a custom tool to recommend a testing profile for each of your targets.
Posted: 22 Sep 2016 | Published: 29 Jul 2016

IBM

Give Your Threat Counter-Measures a Shot in the Arm
sponsored by Fortinet, Inc.
WHITE PAPER: Discover a deep (but concise) look at the current evolution of the modern security landscape: giving a succinct rundown of why attacks are stronger than ever, how to develop a strategic defense, and what to look for in solutions. Gain actionable insight into prevention, detection, mitigation, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Fortinet, Inc.

How Graphiq Blocked Bot Data-Scrapers & Improved SEO
sponsored by Distil Networks
CASE STUDY: Uncover not only how to block bot data-scrapers, monitor suspicious activity, and eliminate spikes in traffic, but also how to significantly improve the user experience. Also learn how to deploy an automatically updating "known violators" database to keep up with the latest threats.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Distil Networks

A Certified Concern
sponsored by SearchSecurity.com
EBOOK: Can that CA be trusted? Certificate authority risks are many, but since there's no avoiding SSL and TLS, at least for now. Here's how to increase CA security.
Posted: 21 Sep 2016 | Published: 20 Sep 2016

SearchSecurity.com

Raise the Bar on Your Data Center Efficiency
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this exclusive white paper, learn how to develop a cloud environment that is simple to use and easy to manage. Read on to speed your service delivery, lower costs, and increase the efficiency of your data center in its entirety with a hybrid cloud IT infrastructure.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Hewlett Packard Enterprise

Sensible one-page thoughts on managing performance
sponsored by ComputerWeekly.com
EGUIDE: Ludo Houdenaert distils a lifetime of experience on managing performance in the IT department into this collection of short, digestible articles, written especially for Computer Weekly.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

8 Reasons to Rethink Virtualization in Your Datacenter
sponsored by Nutanix
WHITE PAPER: The time has come for virtualization to become integrated as a core feature into the rest of the infrastructure. Explore an infrastructure platform delivering enterprise-class storage, compute, and virtualization services for any app and learn eight benefits of integrating virtualization in your data center infrastructure.
Posted: 23 Sep 2016 | Published: 31 Dec 2015

Nutanix

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

How Can Internet Hijacking be Prevented or Mitigated?
sponsored by Dimension Data
EGUIDE: In this e-guide learn the benefits of basic cyberhygiene in combating persistent attacks and become more effective in protecting your enterprise's data.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement