IT Services  >   Telecommunications Services  >   Wireless Services  >  

Short Message Service

RSS Feed    Add to Google    Add to My Yahoo!
Short Message Service Reports
 
Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Increase Your Conversion Rate with Better Verification
sponsored by Nexmo
WHITE PAPER: In this resource, discover how you can use a single API to streamline your user verification and increase conversion.
Posted: 20 Apr 2015 | Published: 20 Apr 2015

Nexmo

Integrating Mobile Device Management with UC Systems and Features
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the issues with combining the unique communications services and interfaces of multiple mobile device operating systems with corporate unified communications (UC) strategies, and best practices to overcome these challenges.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

SearchSecurity.com

Taking a SIP: What Executives Should Know about IP Transformation in the Contact Center
sponsored by Genesys
WHITE PAPER: This white paper is intended for executives who are seeking to understand why SIP (Session Initiation Protocol) is a must-have technology for the contact center today, and how SIP-enabled IP solutions can help align you with your goals.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

Genesys

A Quick-Start Guide to Deploy an SMS Strategy for Business
sponsored by StrikeIron
WHITE PAPER: SMS is emerging as one of the most effective means of communication -- short, digestible messages sent rapidly to the right users. In this white paper, you'll find a 4-step guide to deploying an SMS strategy for customer relationship management (CRM) and marketing.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

StrikeIron

SMS Authentication: 10 Things to Know - Before You Buy
sponsored by SafeNet, Inc.
WHITE PAPER: SMS authentication can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff. In choosing any authentication solution, organizations will be well served by taking many key considerations into account. Read this paper to learn more!
Posted: 26 Jul 2010 | Published: 08 Jun 2010

SafeNet, Inc.

Genesys Global Consumer Survey - 2007
sponsored by Genesys
WHITE PAPER: This survey highlights the importance of the contact center experience and the direct impact it can have on revenue and consumer loyalty, it also reveals some interesting trends in consumer expectations.
Posted: 25 Mar 2008 | Published: 01 Jan 2007

Genesys

IPCheck Server Monitor Version 5
sponsored by Paessler AG
SOFTWARE DEMO: With a bird's eye view IPCheck Server Monitor observes your network, servers, or applications and will notify you as soon as it detects a problem. If you don't hear from IPCheck Server Monitor you know that your business is running smoothly.
Posted: 10 Sep 2007 | Premiered: 29 Aug 2007

Paessler AG

ABBYY TextGrabber + Translator Mobile App
sponsored by ABBYY
VIDEO: This video details a text-grabbing and translator app that lets you save printed text from any magazine, book, document, etc. – in more than 60 languages – on your device. View now to learn how this app can immediately edit, translate, publish to social media, or forward by e-mail or SMS.
Posted: 16 May 2012 | Premiered: 29 Sep 2011

ABBYY

Intuitive and Secure, Two-Factor Authentication on Mobile Phones
sponsored by Confident Technologies
WHITE PAPER: Many online business and websites today are utilizing user's mobile phones for two-factor authentication. However, attacks on mobile devices and the SMS communication channel are increasing, calling for more secure methods of authentication. View this paper now to explore effective multi-layered, multifactor authentication methods.
Posted: 01 Sep 2011 | Published: 25 Aug 2011

Confident Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement