IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Push MessagingReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Improve the Confidence in Your Big Data with IBM InfoSphere
sponsored by IBM
WHITE PAPER: This informative white paper discusses how organizations can use information governance to improve the confidence in big data.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IBM

How to Stay Competitive in the Evolving ITSM Landscape
sponsored by FrontRange Solutions Inc.
VIDEO: In this video, discover how IT service management's competitive landscape is evolving—and not just focusing on solely the cloud or an on-premise environment. A vendor who provides a hybrid solution will be the one that comes out on top in the end, due to flexibility and scalability.
Posted: 22 Jul 2014 | Premiered: 30 Jan 2014

FrontRange Solutions Inc.

Architecting for the Cloud: Best Practices
sponsored by Amazon Web Services
WHITE PAPER: This paper focuses in on concepts, principles and best practices in creating new cloud applications or migrating existing apps to the cloud. Discover how elasticity and other concepts have emerged due to the cloud's dynamic nature.
Posted: 18 Jul 2014 | Published: 30 Jan 2011


Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
WHITE PAPER: This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: 22 Jul 2014 | Published: 05 Mar 2014

CDW Corporation

Solution Spotlight: Threat Intelligence Can Give Enterprise Security the Upper Hand
sponsored by IBM
EGUIDE: In this expert e-guide, discover how threat intelligence can go hand in hand with new technology—and how to avoid system vulnerabilities for security purposes.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

Strengthening and Simplifying Enterprise Security and Data Protection
sponsored by CDW Corporation
WHITE PAPER: This informative white paper describes one company's comprehensive portfolio of security and data protection solutions.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

CDW Corporation

Keeping IT Security Decision-Making on Track
sponsored by CDW Corporation
WHITE PAPER: This resource defines multiple approaches to IT security organization and decision-making that can help companies to determine the most effective ways of functioning in these areas.
Posted: 22 Jul 2014 | Published: 21 Feb 2013

CDW Corporation

Auditing Security Checklist for Use of AWS
sponsored by Amazon Web Services
WHITE PAPER: This paper is designed to help internal compliance teams and their external auditors with a checklist for assessing an organization's AWS security strategy.
Posted: 11 Jul 2014 | Published: 30 Jun 2014


Complexity and Cost Comparison: Cisco UCS vs. IBM Flex System
sponsored by Cisco
WHITE PAPER: Explore this informative comparison report to learn how IBM's Flex System fared in a cost and complexity test against Cisco's UCS solution. Discover which of these solutions offer the best management tools, scalability, performance, and more.
Posted: 15 Jul 2014 | Published: 30 Jun 2013

Cisco
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement