IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed    Add to Google    Add to My Yahoo!
SMS Spam Reports
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

IT's Confidence in Threat Defenses May Be Misplaced
sponsored by McAfee, Inc.
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

McAfee, Inc.

How to Partner to Win: Selecting the right Channel Partner to Drive Business
sponsored by Schneider Electric
PRESENTATION TRANSCRIPT: In the following presentation transcript, learn from Maeve Fox, EMEA Channel Program Manager, Schneider Electric, about the importance of partnering with an effective IT services provider and uncover where you can turn for help in deciding which partner is right for your business.
Posted: 28 Sep 2015 | Published: 28 Sep 2015

Schneider Electric

Why a Bi-Modal Approach to Cloud Infrastructure Strategy Can Benefit Your Organization
sponsored by Dell, Inc.
VIDEO: This video discusses the use of a bimodal approach to IT when implementing a cloud infrastructure strategy, where the first mode focuses on alignment to the business and the second focuses on desires of technical end users. Watch to see how building a cloud competency center for this approach can guide your enterprise through this transformation.
Posted: 01 Oct 2015 | Premiered: 01 Oct 2015

Dell, Inc.

Sizing The Cloud Security Market
sponsored by HyTrust
WHITE PAPER: This report by Forrester Research organizes today's fragmented set of cloud security solutions into four discrete categories for S&R pros and projects spending patterns for the cloud security category as a whole.
Posted: 05 Oct 2015 | Published: 25 Aug 2015


The 20 Habits of Truly Brilliant Presenters
sponsored by Citrix Online Go To Meeting
WHITE PAPER: This resource goes into great detail about making yourself a better presenter, including both levity and practical advice.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

Citrix Online Go To Meeting

Bypassing Security Policies using Insufficient Authorization
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.
Posted: 01 Oct 2015 | Premiered: Apr 14, 2015

WhiteHat Security

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Best Practices for Web Application Security
sponsored by WhiteHat Security
EGUIDE: Access this exclusive e-guide to discover tips for tackling web application security through software development. Learn how to review your Web application security assessment tools and develop a strategy.
Posted: 01 Oct 2015 | Published: 06 May 2015

WhiteHat Security

The Bimodal IT Approach
sponsored by Melbourne IT
WHITE PAPER: In this white paper, learn how to effectively adopt a Bimodal IT operational model. Additionally, see how taking the strategic step towards cloud integration with enterprise services can improve workflow, application delivery, and more.
Posted: 02 Oct 2015 | Published: 02 Oct 2015

Melbourne IT
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement