IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Push Messaging Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Kingpin Communications
WHITE PAPER: This white paper takes a look at the modern threat landscape, including zero-day attacks and advanced persistent threats (APT), and the consequences of not protecting your company's data and networks. Access now to learn how traditional sandboxing compares to advanced sandbox solutions.
Posted: 11 Feb 2016 | Published: 30 Jun 2015

Kingpin Communications

Solution Brief: Satisfying Today's Bandwidth Hungry Consumers
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights a high performance next generation firewall solution that protects information and applications without slowing down your network or affecting availability. Read on to see how this firewall solution can provide your enterprise with in-depth visibility and reporting, highly effective intrusion prevention system, and more.
Posted: 12 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Top 10 Things You Need to Consider When Buying a Hyper-converged Infrastructure
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper illustrates how to rein in IT complexity and promote increased flexibility and agility in your organization with hyper-converged infrastructure. Read on to be introduced to the 10 most crucial factors to consider when contemplating hyper-convergence to remove resource silos and improve IT.
Posted: 05 Feb 2016 | Published: 30 Jun 2015

Hewlett-Packard Enterprise

Zero Trust on the Endpoint
sponsored by Palo Alto Networks
WHITE PAPER: This white paper teaches you a "never trust, always verify" security policy that remedies the deficiencies with perimeter-centric strategies and ensures there's no default trust for any entity or user.
Posted: 11 Feb 2016 | Published: 31 Mar 2015

Palo Alto Networks

Broadening Your VDI Horizon Beyond Thin Client Devices
sponsored by Dell
EGUIDE: This white paper gives you a better understanding of VDI usage over thin client devices and how it can benefit your business.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell

Top 10 Purchasing Considerations for a Hyper-Converged Infrastructure
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this infographic, you will ensure you get the most of your hyper-converged infrastructure by discovering these top 10 purchasing considerations. Read on to evaluate potential vendors based on their ability to support mixed architectures, cover device outages, and more.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

Hewlett-Packard Enterprise

End-to-End Partnership Hits All the Right Notes
sponsored by Dell, Inc.
WHITE PAPER: In this case study, learn how the Royal Opera House refreshed its entire IT setup in stages with a single provider, which included storage, servers, desktops, and more. Take a closer look at each of the elements of this IT overhaul, and the security, mobility, and technological edge the Opera House gained as a result.
Posted: 12 Feb 2016 | Published: 30 Apr 2015

Dell, Inc.

Defense-In-Depth: Database Securing
sponsored by Oracle Corporation
WHITE PAPER: Today, a DBA can leave work with terabytes of information easily. In this technical primer, you'll find details on ways to control access for your authorized users. Uncover strategies for data theft, SQL injection, and noncompliance prevention.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Oracle Corporation

Why it's Time for Locked-Down Desktops
sponsored by Dell
EGUIDE: This e-guide describes the benefits of lock-down desktops and how they can improve your IT security. Lessen support costs and simplify software updates today.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement