IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed   
SMS Spam Multimedia (View All Report Types)
Regulating Privileged Access: When to Require Human Approval Workflows
sponsored by One Identity
VIDEO: Regulating privileged access can be extremely difficult across enterprises. This webcast reveals how to protect privileged access by keeping the human element involved without risking security or killing productivity.
Posted: 19 Feb 2018 | Premiered: 14 Feb 2018

One Identity

Forcepoint CASB: Visibility and Control of Cloud Applications
sponsored by Forcepoint
VIDEO: Watch this webcast to learn about 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they can provide.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018


Your Business Apps are Under Attack: Are you really Protected?
sponsored by Alert Logic
VIDEO: Only 24% of organizations have mature application security in place, according to the 2017 Cybersecurity Trends Report. Take a look at this webcast to reveal statistics regarding app security and what you can do to protect yourself from cyberattacks.
Posted: 22 Sep 2017 | Premiered: 21 Sep 2017

Alert Logic

Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST: In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018

Illusive Networks

Machine Learning with Apache Spark
sponsored by IBM
WEBCAST: This in-depth webcast explores how the high memory bandwidth and high-compute capabilities of GPUs make them ideal for accelerating I/O intensive Spark workloads. Click inside now to learn the 3 approaches to Spark acceleration, as well as some of pros and the cons of this process.
Posted: 14 Mar 2018 | Premiered: Mar 14, 2018, 01:11 EDT (05:11 GMT)


Payer's Place in the Healthcare Ecosystem Keys to Success
sponsored by HealthEdge
VIDEO: Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value.
Posted: 10 Nov 2017 | Premiered: 02 Nov 2017


Mission Impossible? Trusting Disparate Endpoints
sponsored by Citrix
VIDEO: Today's enterprise security landscape is heavily endpoint and user-dependent. You need to protect all sensitive enterprise data regardless of endpoint. In this webinar, you will learn how to secure your enterprise in an endless sea of endpoints.
Posted: 05 Feb 2018 | Premiered: 05 Feb 2018


The Human Factor 2017
sponsored by Proofpoint, Inc.
VIDEO: 90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks.
Posted: 06 Oct 2017 | Premiered: 06 Oct 2017

Proofpoint, Inc.

In Place Analytics for VSAM, ADABAS, DB2, IMS and more
sponsored by IBM
WEBCAST: Hear about the latest QMF enhancements and experience a demonstration of the self-service Business Analytics feature.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management

POWER8 Cost Savings Estimator
sponsored by IBM
WEBCAST: See how much you can save.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement