IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Push Messaging Reports
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Streamline Endpoint Security with the Cloud
sponsored by Trustwave
WHITE PAPER: This white paper explains how putting endpoint security in the cloud can give you effective security that's both affordable and simple.
Posted: 02 Oct 2015 | Published: 31 Dec 2014


The Importance of Secure Application Development Lifecycles
sponsored by WhiteHat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the the myths about compliance-ready web app security assessment tools.
Posted: 01 Oct 2015 | Published: 11 Mar 2015

WhiteHat Security

Social Threat Intelligence: Embracing Collaborative Security
sponsored by Threatstream
WEBCAST: This webcast discusses the benefits of social threat intelligence (STI), a form of threat intelligence that embraces collaboration across enterprises.
Posted: 24 Sep 2015 | Premiered: Jun 18, 2015


Security Insights: Building Secure Social Media Monitoring
sponsored by Unisys
WHITE PAPER: This white paper discusses how you can alleviate customer fears about social media monitoring with better data management and security practices.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Rethinking the IT/Business Partnership to Drive Digital Innovation
sponsored by Oracle Corporation
WHITE PAPER: In the following Harvard Business Review white paper, delve through the results of an extensive survey including the responses from over 270 business and IT pros revealing their strategies for building closer ties between IT and the business.
Posted: 28 Sep 2015 | Published: 28 Sep 2015

Oracle Corporation

Security Certificates and Cryptographic Keys in Peril
sponsored by Venafi
EGUIDE: This expert guide discusses why security certificates and cryptographic keys can no longer be trusted and how you can stay safe from hacks that exploit them.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Best Practices for Data Protection and Business Continuity: A Guide for Small and Midsized Organizations
sponsored by Hewlett-Packard Company
WHITE PAPER: This report discusses the specific security challenges that face SMBs and gives advice for how they can keep their data secure with the resources they have.
Posted: 30 Sep 2015 | Published: 30 Jun 2015

Hewlett-Packard Company

How to Partner to Win: Selecting the right Channel Partner to Drive Business
sponsored by Schneider Electric
PRESENTATION TRANSCRIPT: In the following presentation transcript, learn from Maeve Fox, EMEA Channel Program Manager, Schneider Electric, about the importance of partnering with an effective IT services provider and uncover where you can turn for help in deciding which partner is right for your business.
Posted: 28 Sep 2015 | Published: 28 Sep 2015

Schneider Electric

The Essential Guide to Microsoft Azure Compliance
sponsored by Softchoice Corporation
ESSENTIAL GUIDE: Access this essential guide to dive deep into security, compliance, and regulations with Microsoft Azure and examine how Azure handles major compliance and regulation concerns – including those for PCI, HIPPA, and more.
Posted: 02 Oct 2015 | Published: 02 Oct 2015

Softchoice Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement