IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed   
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 

Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Spam Multimedia (View All Report Types)
76 - 100 of 747 Matches Previous Page  |  Next Page
Be the Champion of Security in a DevOps World
sponsored by Veracode, Inc.
VIDEO: There tends to be a gap, both technically and culturally, between what developers are doing and what security is doing, which often creates vulnerabilities. How can we close this gap without turning security into a bottleneck? Watch this webcast to learn how to incorporate security into the DevOps process.
Posted: 15 Jan 2018 | Premiered: 15 Jan 2018

Veracode, Inc.

Breathe New Life Into Your IPS Strategy with Today's Evolved Options
sponsored by Fortinet, Inc.
WEBCAST: Intrusion Prevention Systems (IPS) play a critical role in network security by monitoring connections for malicious activities, but attacks are becoming more complex. Listen in on this webinar to learn what approach to IPS will help meet your unique network security needs.
Posted: 02 Jul 2018 | Premiered: Jul 2, 2018

Fortinet, Inc.

Build a Hybrid Cloud with Red Hat Containers on Microsoft Clouds
sponsored by Red Hat
VIDEO: In this slideshow, learn how Red Hat containers and Microsoft Azure are being bundled to provide the best of open source and cloud application features to modern development teams. Plus, check out a live demonstration on how to deploy OpenShift via Azure's control interface and Red Hat's management engine.
Posted: 24 Jul 2018 | Premiered: 16 Jul 2018

Red Hat

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. Plus you learn why becoming a technology partner with Citrix will expand your business reach and bottom line.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready

Behavioral Analytics: Telling the Stories Hidden in IT Security and Operations Data
sponsored by Prelert
WEBCAST: In this webcast, learn how to go beyond anomaly detection with behavioral analytics and insights. Discover how to investigate commonalities between anomalies to better understand and identify potential threats.
Posted: 02 Feb 2016 | Premiered: Jan 27, 2016

Prelert

Best for Business: Security and Manageability on the Chip
sponsored by Intel Corporation
SOFTWARE DEMO: This demo explains how to secure and manage notebooks with Intel Centrino2 with vPro technology and desktops with Intel Core 2 processors with vPro technology.
Posted: 12 Aug 2008 | Premiered: 11 Aug 2007

Intel Corporation

Best Practices for Securing SaaS with CASB
sponsored by McAfee, Inc.
VIDEO: Listen to Securosis and McAfee discuss the challenges in cloud security and the benefits of agile security solutions.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Better cloud security with certificate and key management
sponsored by Venafi
WEBCAST: This webcast explores how key management can help you overcome the data security challenges of cloud computing. Inside, discover the best practices for automating certificate management – click through to view now.
Posted: 09 Nov 2012 | Premiered: Nov 9, 2012

Venafi

Beyond Device Recognition
sponsored by iovation, Inc.
VIDEO: Find out how to strike the balance between cybersecurity and user accessibility for devices on-the-go with advanced device intelligence that uses device behavior, content, and reputation to stop fraud in its tracks.
Posted: 18 Jun 2018 | Premiered: 18 Jun 2018

iovation, Inc.

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

BlackBerry Security Response - Protecting Your Deployments
sponsored by BlackBerry
WEBCAST: This exclusive webcast examines how you can secure your mobile environment, protecting your deployments and ensuring that your sensitive mobile data remains in the right hands.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

BlackBerry

Branch, Cloud and Software Defined with Riverbend
sponsored by Hewlett-Packard Enterprise
VIDEO: David Groves explains how the app performance company is growing its services business in partnership with HPE.
Posted: 22 Dec 2016 | Premiered: 22 Dec 2016

TOPICS:  IT Management
Hewlett-Packard Enterprise

BreakingPoint: Denial of Service and Network Security Testing
sponsored by Ixia - Keysight
WEBCAST: This webcast demonstrates how to set up and run various security tests with BreakingPoint, as well as how to analyze the results of those tests. Find out how you can increase your understanding of your network and its defenses against threats like denial of service (DoS) attacks.
Posted: 06 Jul 2018 | Premiered: Jul 6, 2018

Ixia - Keysight

Brian Madden and BlackBerry's Alan Panezic discuss BlackBerry Mobile Fusion, Balance, and PlayBook 2.0
sponsored by BlackBerry
VIDEO: Watch this 10 minute video to hear Brian Madden, blogger, and Alan Panezic, VP of Enterprise Product Management from BlackBerry, discuss the new offerings BlackBerry is giving to make sure employers and employees are happy with their mobile device capabilities.
Posted: 24 Feb 2012 | Premiered: 24 Feb 2012

BlackBerry

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

BSR Podcast: Obamacare, the Cloud's impact and more
sponsored by CA Technologies.
PODCAST: Today's businesses depend on IT to deliver competitive advantage and superior user experiences, and with business service reliability, you can do just that. But how do you leverage this concept to not only ensure application availability, but end-to-end service reliability? Tune in to this podcast and find out.
Posted: 09 Jan 2014 | Premiered: Nov 20, 2013

CA Technologies.

Build a Lean Cloud Based Security Operations Center
sponsored by Splunk
WEBCAST: Discover how Travis Perkins protected the organization while moving an on-premise legacy SOC to a lean SOC in the cloud.
Posted: 08 Nov 2016 | Premiered: Nov 8, 2016

TOPICS:  IT Management
Splunk

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Building Secure Private Clouds with VMware vCloud Director
sponsored by VMware, Inc.
WEBCAST: VMware vCloud Director gives you the ability to build secure private clouds that greatly increase datacenter efficiency and business agility. Coupled with VMware vSphere, VMware vCloud Director delivers cloud computing for existing datacenters by pooling virtual infrastructure resources and delivering them to users as catalog-based services.
Posted: 25 Apr 2011 | Premiered: Apr 25, 2011

VMware, Inc.

Business Process Management and Enterprise Architecture for Better Business Outcomes
sponsored by IBM
WEBCAST: This webcast explores how WebSphere and IBM Rational work together to help businesses achieve strategic objectives with reduced risk and cost and also for translating business vision and strategy into architectural change.
Posted: 16 Jun 2010 | Premiered: Jun 24, 2010, 12:00 EDT (16:00 GMT)

IBM

Butler County’s Iron Mountain Houses Some of U.S.’s Most Amazing, Priceless Treasures
sponsored by Iron Mountain
WEBCAST: This news story describes why Iron Mountain's Butler County, Pennsylvania data center facility is ideal for storing and preserving your business-critical data. Learn why this facility is trusted to securely store everything from the original prints of classic movies to a huge variety of documents and records.
Posted: 29 Jan 2014 | Premiered: Nov 19, 2013

Iron Mountain

Butterfly Effect: HCI Has Even Bigger Benefits Than You See
sponsored by Riverbed Technology, Inc.
WEBCAST: Learn how ROBO hyperconvergence creates hidden productivity and cost benefits in ways that aren't obvious at first.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.

BYOD Initiative and Workforce Mobility with the VMware Mobile Secure Workforce Solution
sponsored by VMware
WEBCAST: This exclusive webcast examines an enterprise mobility solution for simplifying IT control and keeping your workforce mobile.
Posted: 17 Oct 2013 | Premiered: Oct 17, 2013

VMware

CA Clarity Project and Portfolio Management
sponsored by CA Technologies.
PRODUCT DEMO: Watch this in-depth product demo to learn how CA Clarity works. This project and portfolio management solution enables users to view all projects, programs, services, assets, and applications in a collection of portfolios.
Posted: 31 Mar 2010 | Premiered: 30 Mar 2010

CA Technologies.

CA eHealth Performance Manager Demo
sponsored by CA Technologies.
PRODUCT DEMO: Download this demo to learn how you can proactively monitor performance of data and voice networks, physical and virtual systems, environmentals, databases and client/server applications across IT, all from one interface, before your business is negatively impacted.
Posted: 23 Nov 2009 | Premiered: 23 Oct 2009

CA Technologies.
76 - 100 of 747 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement