IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed    Add to Google    Add to My Yahoo!
Push Messaging Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Mobile Device Inventory: The First Step in Enterprise Mobile Management
sponsored by Snow Software
WHITE PAPER: Read on to examine the need for collecting and reporting on mobile inventory and how it needs to be part of an enterprise-wide software asset management (SAM) program. You'll discover a maturity path for managing mobile devices in a SAM context, and more inside.
Posted: 12 Oct 2017 | Published: 31 Dec 2016

Snow Software

Want to Transform? Start with the Mainframe
sponsored by Ensono Limited
RESOURCE: Leading businesses rely on mainframes, but many see this legacy environment as a barrier to transformation. The truth is that the mainframe will only go away if you want it to, but why would you when it offers the same power as the public cloud while sitting in your data center. Read on to see why transformation needs to start with your mainframe.
Posted: 18 Oct 2017 | Published: 21 Sep 2017

Ensono Limited

Overview of AWS Security - Network Security
sponsored by Amazon Web Services
WHITE PAPER: Explore this white paper to learn more about AWS cloud monitoring tools designed to protect your network architecture from threats like DDoS attacks, IP spoofing, and more.
Posted: 10 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

A CISO's Guide to Mobile Threat Defense
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Check Point Software Technologies Ltd.

Security at Scale: Logging in AWS
sponsored by Amazon Web Services
WHITE PAPER: The logging and monitoring of API calls in the AWS cloud are key components in security and operational best practices, as well as requirements for industry and regulatory compliance. This white paper explores how to achieve compliance in AWS with common logging requirements.
Posted: 09 Oct 2017 | Published: 31 Oct 2015

Amazon Web Services

Study: Bank of Ireland Cuts Software Spending for Key Vendors with Snow License Manager
sponsored by Snow Software
CASE STUDY: With 15,000 PCs and 3,500 servers, Bank of Ireland was in need of a new software asset management (SAM) strategy. Read this study to see how they were able to drastically reduce the costs of renewing software licenses, remove unused and duplicated installations, and streamline software procurement.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Snow Software

Why Banks Need a Dedicated Mobile Banking Security System
sponsored by HID Global
WHITE PAPER: According to a study conducted by Ratewatch, 81% of financial institutions surveyed are currently offering mobile banking services, but 36% of consumers say they are not using it because they're worried about security risks. This white paper reveals frequently asked questions by consumers regarding mobile security.
Posted: 20 Oct 2017 | Published: 31 Dec 2016

HID Global

DDoS Emerges as Primary Threat Vector for IoT
sponsored by Arbor Networks
WHITE PAPER: In this research content, learn why many organizations are turning to a cloud-based DDoS mitigation service with tremendous data scrubbing capacity. Then uncover how past IoT attacks influence organizations to prevent and detect application layer attacks faster.
Posted: 20 Oct 2017 | Published: 11 Nov 2016

Arbor Networks

Taking a Fresh Approach to Your User Device Management
sponsored by Centrality
EBOOK: Technology is always changing, updating, and upgrading. Keeping hardware up-to-date in an era of constant change is no small task. This white paper explores a new approach to user device management that helps overcome the top ten business challenges facing the digital economy.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Centrality
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement