IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Push Messaging Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Understanding Valdation: Understanding the Art and Science of SSL Certificate Validation
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper acts as a buyer's guide to choosing the right level of SSL certificate validation for your organization.
Posted: 16 Jul 2015 | Published: 15 Jan 2014

GeoTrust, Inc.

Why Always-on SSL is Critical for Company Websites Today
sponsored by GeoTrust, Inc.
WHITE PAPER: This paper discusses how always-on SSL offers enhanced security to protect against these attacks, while delivering several additional business benefits.
Posted: 16 Jul 2015 | Published: 01 Jul 2015

GeoTrust, Inc.

Implementing an Intelligent Security Architecture
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, you'll learn about Cisco's intelligent security architecture that spans endpoints, networks, security analytics, malware protection, and threat intelligence. Read on and discover how you can benefit from a more intelligent security system.
Posted: 20 Jul 2015 | Published: 27 Feb 2015

Cisco Systems, Inc.

5 Best Practices to Make Security Everyone's Business
sponsored by Citrix
WHITE PAPER: This white paper presents the five steps you can take to help your end users advance your security strategy instead of hindering it.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Safeguarding Data and the Mobile Enterprise
sponsored by IBM
WHITE PAPER: As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

IBM

Best Practices for Solving Cloud Infrastructure Security Challenges
sponsored by CloudPassage
WEBCAST: This 20/20 webcast takes a look at the best practices organizations can implement to ensure cloud security, what it would take to implement those practices, and how organizations can create a framework for making the best decisions about cloud security going forward.
Posted: 16 Jul 2015 | Premiered: Jul 16, 2015

CloudPassage

Test Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This free demo allows you to test out a security platform that promises to help you better monitor, analyze and report on malicious behavior in your network.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015

AlienVault

Managing the Madness of Mobility
sponsored by Sprint
EBOOK: For too long, high buy-in costs, time-consuming management tasks, and rigid, inflexible data plans have stopped businesses from empowering their employees with the latest productivity-boosting wireless. This e-book highlights a new model for mobility-as-a-service, and details several of its benefits.
Posted: 31 Jul 2015 | Published: 31 Jul 2015

Sprint

Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement