IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Push Messaging Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

HOW TO SOLVE DATA RESIDENCY, PRIVACY, AND SECURITY ISSUES IN THE CLOUD
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to satisfy not only cloud regulations by establishing data residency, addressing privacy issues, and keeping it secure, but also the need to control and manage your cloud presence.
Posted: 23 Feb 2017 | Published: 22 Feb 2017

TOPICS:  Security
Symantec & Blue Coat Systems

How Data Privacy Laws Impact Cloud Adoption In The UK
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn the strengths of tokenization when applied to ensuring regulated data never leaves the domain or control of your organization, risking falling out of compliance with the law.
Posted: 23 Feb 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Reduce the Time it Takes to Resolve IT Issues and Restore IT Services With Communication Integration
sponsored by EverBridge Inc.
WHITE PAPER: In this white paper discover a program that lets you connect the right on-call personnel with the right information to get restoration done faster. Learn how you can get detailed report and incident notifications and responses, manage group and shift calendars from one place, and more.
Posted: 20 Feb 2017 | Published: 20 Feb 2017

EverBridge Inc.

Hybrid Cloud Is About Choice
sponsored by IBM
WHITE PAPER: Hybrid cloud computing integrates cloud resources with traditional IT infrastructure to ensure security, high performance, and accelerated application delivery. Read this resource to discover how you can leverage hybrid cloud to extend IT's agility and support new business models.
Posted: 17 Feb 2017 | Published: 31 Dec 2016

IBM

10 Reasons Why Your IT Incidents Aren't Resolved Faster
sponsored by EverBridge Inc.
WHITE PAPER: When disaster strikes, one of the most important aspects of your recovery strategy is communication. Access this white paper to learn the top 10 reasons why your IT incidents are taking time to resolve and how improving your communication strategy helps prepare you to handle the unexpected.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

EverBridge Inc.

How To Eliminate Downtime With NGFWs
sponsored by Forcepoint
WHITE PAPER: Uninterrupted access to Internet-based apps, data, and servers are crucial to a successful business. But how do you eliminate downtime that can get in the way? In this white paper, learn how NDFW security technology can maintain network defenses and make downtime a distant memory.
Posted: 17 Feb 2017 | Published: 04 Mar 2016

Forcepoint

Unified IT Alerting To Help You Contact Problem Solvers and Reassure Customers Faster
sponsored by EverBridge Inc.
WEBCAST: In this webcast learn about a platform that allows you to not only automatically notify the right people to get your system back online, but also inform your customers on resolution progress.
Posted: 20 Feb 2017 | Premiered: Jul 25, 2016

EverBridge Inc.

New Strategies For Backup and Disaster Recovery
sponsored by Iron Mountain
EGUIDE: In this expert-eguide, learn steps to keeping your data more secure like focusing on the 3 major techniques used in data backup, how to quickly recover from a ransomware attack, why using a recovery-in-place technique could be beneficial, and more.
Posted: 21 Feb 2017 | Published: 21 Feb 2017

Iron Mountain

Keep Systems Secure with Best Practices – and Best User Experience – in Mind
sponsored by IBM
WHITE PAPER: Gain a better understand the benefits of mobile multi-factor authentication (MMFA) and learn why passwords alone aren't enough, about 3 MMFA use-case scenarios, what market factors are driving MMFA adoption, and more.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement