IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed    Add to Google    Add to My Yahoo!
SMS Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Office 365: How to Deploy Truly Comprehensive Security
sponsored by Proofpoint, Inc.
RESOURCE: Find 10 tips for securing Office 365, including considerations for deploying effective email protection, blocking credential phishing, preventing business email compromise, and more.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Proofpoint, Inc.

Complete your Converged IT Strategy with Hyper Converged Systems and Availability
sponsored by Veeam Software
DATA SHEET: IT is being unnaturally forced in to adapt and evolve by user and business demands. Hyper-converged systems have come to give power back to your IT department. Access this data sheet to learn how to go about adopting a converged IT strategy and what its impact will mean for your organization.
Posted: 14 Mar 2017 | Published: 31 May 2016

Veeam Software

What it Takes for Encryption Key Manager to Combat Today's Threats
sponsored by Gemalto
WHITE PAPER: Learn how to manage your existing keys from third-party solutions, while offering you a full portfolio of flexible encryption options that work on-premises, in traditional data centers, and in virtualized public or private-cloud environments.
Posted: 13 Mar 2017 | Published: 13 Mar 2017

Gemalto

FI-TS Provides SAP in the Cloud Securely with Enterprise Virtualization
sponsored by Red Hat
CASE STUDY: How can an IT service provider for the financial and insurance industry provide the most up-to-date services to ensure that clients meet both regulatory and customer expectations? Access this case study to learn how one IT outsourcicng partner was able to reduce costs while optimizing processes with cloud technology.
Posted: 16 Mar 2017 | Published: 30 Apr 2014

Red Hat

Hyper-convergence Extends to New Horizons—and New Uses with All-flash Storage
sponsored by Lenovo
EGUIDE: Download this expert guide to gain a foothold in the hyper-converged market, and discover why all-flash storage is now an integral component in converged infrastructure. Read on to learn how to apply flash-based HCI to high-performance databases, VDI workloads, and more.
Posted: 15 Mar 2017 | Published: 10 Mar 2017

Lenovo

Remote access: Simple, secure ways to deliver a great experience for remote users
sponsored by Citrix
WHITE PAPER: Discover a remote access solution that enables IT to meet requirements for security and manageability while also accounting for a user friendly experience. Some key aspects of the solution include a securely designed architecture for desktop and application virtualization and a consistent remote access method over any network.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Citrix

Reduce the Number of Ransomware Infections Across Your Organization
sponsored by Cisco and Dimension Data
WHITE PAPER: Ransomware is becoming a bigger threat every quarter. Learn what ransomware truly is and how it works, as well as what can be done to mitigate its threat to your organization.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Cisco and Dimension Data

How to Achieve Stronger Information Security
sponsored by Iron Mountain
WHITE PAPER: Find out just how important paper is to data privacy and the risks created from ignoring it. Plus, uncover a free guide to help you achieve stronger information security.
Posted: 16 Mar 2017 | Published: 25 Jan 2016

Iron Mountain

The Journey to Hyper-Converged Success Starts Here
sponsored by Dell EMC
RESOURCE: The journey to hyper-converged success begins, of course, with identifying the right appliance for your workload capacity. Access this infographic to discover the keys to implementing a virtual SAN-based (vSAN) hyper-converged infrastructure, purpose-built to modernize your data center.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

Dell EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement