IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Pager Spam

RSS Feed   
Pager Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

DPI and Cloud Computing Security Platforms for the IoT Era
sponsored by ADLINK Technology
WHITE PAPER: As IoT continues to grow, the security of networks is at risk. This resource offers strategies for securing network devices used in PDI for cloud computing security as well as an approach to integrating hardware and software to address new security requirements of the IoT era.
Posted: 05 Feb 2018 | Published: 05 Feb 2018

ADLINK Technology

The Transformational Power of Hyper-Converged Infrastructure
sponsored by VMware & Intel
WHITE PAPER: Download this paper to delve into the details of one hyper-converged infrastructure (HCI) system—VMware vSAN. You'll learn which workloads are most in need of HCI, how this system can eliminate legacy difficulties by prepping the infrastructure stack for cloud-native apps, and more.
Posted: 16 Jan 2018 | Published: 31 Dec 2016

VMware & Intel

What the Hybrid Cloud is Not: Urban Myths About the Multi-Cloud World
sponsored by Concerto Cloud Services
WHITE PAPER: Many CIOs are wary of migrating apps and data due to lingering myths from cloud's early days. This paper busts the top five myths surrounding hybrid cloud, exposing what cloud is really capable of, and why now is the time to get on board with hybrid cloud.
Posted: 01 Feb 2018 | Published: 01 Feb 2018

Concerto Cloud Services

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

CrowdStrike

Cyberespionage Campaign Hits Energy Companies
sponsored by SecurityMatters
WHITE PAPER: What will your company do if the next Dragonfly-type attack targets you? Discover why the implementation of a defense-in-depth strategy is key to successfully mitigate cyberthreats like Dragonfly.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

SecurityMatters

The Value of Standardizing on Red Hat Infrastructure Solutions
sponsored by Red Hat
WHITE PAPER: This IDC white paper delves into the business value of standardizing on Red Hat Enterprise Linux (RHEL) with supporting management software Red Hat Satellite, versus on other Linux distributions. Access now to read the analysis, including the 4 business areas in which standardizing will realize the most return.
Posted: 05 Feb 2018 | Published: 31 Dec 2017

Red Hat

v
sponsored by ServiceNow
WHITE PAPER: To realize a greater return from the change portfolio, read this white paper, which discusses how adopting a Change and Governance Framework will renew IT's ability to become a true engine for driving business growth.
Posted: 25 Jan 2018 | Published: 01 Jan 2018

ServiceNow

The Rebirth of Endpoint Protection
sponsored by NSS Labs
WHITE PAPER: Advanced endpoint protection shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and in a constant state of flux. Inside this resource from NSS Labs uncover key factors to consider when evaluating AEP.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

NSS Labs

Four Compelling Use Cases for Hyper-Converged Infrastructure
sponsored by VMware & Intel
WHITE PAPER: In this paper, you'll examine four concrete use cases for VMware v-SAN-powered HCI, with each deconstructed in detail. Read on to see the implementation rationale for all four cases and how this system evolves restrictive hardware-centric environments.
Posted: 17 Jan 2018 | Published: 31 Dec 2017

VMware & Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement