IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed    Add to Google    Add to My Yahoo!
SMS Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

DDoS Attack Mitigation Technologies Demystified
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive whitepaper dives into the technologies used traditionally to detect and mitigate DDoS attacks, and how they evolved to the stands they're at today. Read on to learn more.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Fortinet, Inc.

Providing Security and Compliance for an Ever-Growing Number of Endpoints
sponsored by IBM
WHITE PAPER: This white paper introduces you to an easy-to-manage, quick-to-deploy solution that supports security for a large variety and large numbers of endpoints — from servers to desktop PCs, Internet-connected laptops, smartphones and other mobile devices, as well as specialized equipment such as point-of-sale devices, ATMs and self-service kiosks.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

IBM

What to Consider When Formulating an Enterprise Mobile Security Strategy
sponsored by BlackBerry
EGUIDE: In this e-guide, Moriah Sargent explains why mobile device security policies should be revisited and revised often. In addition, Zeus Kerravala discusses essential enterprise security controls for the increasing amount of high-value information stored on mobile devices.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

BlackBerry

IDC MarketScape Excerpt: Worldwide Managed Security Services 2014 Vendor Assessment
sponsored by IBM
WHITE PAPER: This important white paper answers those questions by evaluating IBM's MSSP offering on service capability across the MSS life cycle, revenue, and geographic presence.
Posted: 21 Jan 2015 | Published: 17 Jun 2014

IBM

Protecting Data, Enabling Mobility and Empowering Users: Unified Endpoint Management
sponsored by IBM
WHITE PAPER: Download this exclusive white paper now to learn about how much a breach really costs, how long breaches often go undetected, how to handle the always-connected user, and much more.
Posted: 23 Jan 2015 | Published: 15 Dec 2014

IBM

Magic Quadrant for Endpoint Protection Platforms
sponsored by Symantec Corporation
WHITE PAPER: This exclusive white paper compares 18 leading endpoint security solutions.
Posted: 22 Jan 2015 | Published: 22 Dec 2014

Symantec Corporation

Symantec Intelligence Report -November 2014
sponsored by Symantec Corporation
WHITE PAPER: This exclusive white paper provides in-depth analysis of the security landscape from November 2014.
Posted: 30 Jan 2015 | Published: 18 Nov 2014

Symantec Corporation

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This white paper explains how a Web Application Scanning solution can help you to locate and test web-based apps, and provides a checklist of best practices that will help you to understand what to look for when selecting a WAS solution.
Posted: 23 Jan 2015 | Published: 16 May 2013

Qualys

Penn State saves up to USD 300,000 per year by using IBM Endpoint Manager
sponsored by IBM
VIDEO: This exclusive video case study reveals the endpoint management solution Penn State University turned to in order to manage their heterogeneous distributed environments and reduce costs.
Posted: 30 Jan 2015 | Premiered: 30 Jan 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement