IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed   
Cellphone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Employee & Device Monitoring: Dispelling the Myths
sponsored by Forcepoint
VIDEO: Watch this webcast to learn how the rise in workforce cyber threats as well as the legal restrictions 3 countries are putting the pressure on CISOs to improve their device monitoring. Then learn how you can create a powerful and proactive insider threat program.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018

Forcepoint

Evolution of Next Generation Firewall
sponsored by NSS Labs
WHITE PAPER: Enterprises need to stop attackers at the network perimeter, and that's where next generation firewalls (NGFWs) come in. But how should you choose a next generation firewall? Learn how in this white paper.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

NSS Labs

Holistic Endpoint Security
sponsored by Cylance
RESOURCE: According to Forrester, as cyber threats are increasing in number and complexity, traditional approaches to endpoint security have become outdated and less effective. This Forrester study offers a market overview of endpoint security and provides key trends within the industry as well as examples of strategies organizations are taking.
Posted: 13 Feb 2018 | Published: 13 Feb 2018

Cylance

Case Study: Convergys Corporation and Server Automation
sponsored by MicroFocus
CASE STUDY: In order to automate server builds and achieve faster provisioning, Convergys decided to utilize a server automation suite. Download this case study to read Convergys' results in their entirety, with the top 10 benefits realized from server automation deployment.
Posted: 15 Feb 2018 | Published: 31 Dec 2017

MicroFocus

What is Attribute-Based Access Control?
sponsored by Axiomatics
WHITE PAPER: Learn about the evolution of traditional role-based access control and how the shift towards attribute-based access control is impacting cybersecurity.
Posted: 08 Feb 2018 | Published: 31 Dec 2016

Axiomatics

Global De-Duplication for Encrypted Data
sponsored by Carbonite
WHITE PAPER: Global deduplication removes redundant data across the entire organization, not just individual systems. Download this white paper to uncover a global deduplication technology that is executed on encrypted data using unique encryption keys for each block of data, so businesses get the benefits of deduplication without sacrificing data security.
Posted: 19 Feb 2018 | Published: 19 Feb 2018

Carbonite

UK IT Priorities 2018
sponsored by ComputerWeekly.com
EGUIDE: Every year, Computer Weekly conducts a large-scale survey of our readers to find out their IT spending priorities for the year ahead – it's always an interesting take on what's happening in IT departments around the country because it's coming from the leaders making those technology purchasing decisions.
Posted: 12 Feb 2018 | Published: 12 Feb 2018

ComputerWeekly.com

How to stop IT incidents from killing employee productivity
sponsored by Nexthink
EBOOK: Download this white paper to discover IT service management that predicts and prevents IT issues from disrupting business-as-usual. Find out how the ITSM framework involves the empowerment of users and fully automated incident resolution.
Posted: 14 Feb 2018 | Published: 14 Feb 2018


10 Do's and Don'ts When Migrating to the Cloud
sponsored by Leaseweb
WHITE PAPER: In this white paper, learn 5 things you should be doing to prepare for your cloud migration, like sharing your roadmap with your teams and checking the compliance certifications of your partner, as well as 5 things you should certainly avoid like abandoning your current investments or planning to migrate in one big move.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Leaseweb
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement