IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed   
Mobile Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Security Automation Quick Wins
sponsored by Siemplify
VIDEO: The state of security operations has led to teams embracing automation to combat alert overload and make the most of their security tools. However, many companies don't know where to start. This webcast details which processes are ripe for automation and gives practical examples for automating security operations processes.
Posted: 07 Dec 2018 | Premiered: 05 Dec 2018

Siemplify

Automating Security and Compliance for Hybrid Cloud Environments
sponsored by Red Hat
VIDEO: Why automate security and compliance? Tune into this webinar to learn about an automated approach that can help you perform audit scans on your systems, ensure governance and control, easily provide security-compliant hosts, and more.
Posted: 30 Nov 2018 | Premiered: 20 Nov 2018

Red Hat

SecureWorks and McLaren Partnership
sponsored by Dell SecureWorks
VIDEO: SecureWorks is the security partner of McLaren Group. Using SecureWorks has allowed McLaren to accelerate threat detection. SecureWorks applies machine learning as well as human and artificial intelligence to process logs. In this webcast, Jonathan Neal and Paul Brimacombe discuss their experience partnering with SecureWorks.
Posted: 12 Dec 2018 | Premiered: 10 Dec 2018

Dell SecureWorks

Armor Complete: Technical Solution Brief
sponsored by Armor
RESOURCE: Learn about secure cloud hosting platform and how it could help your organization reduce the burden of security without compromising it.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Armor

Multi-Factor Authentication Buyer's Guide: Getting Started
sponsored by Ping Identity Corporation
WHITE PAPER: Modern MFA solutions allow you to contextually step up your security and mitigate the costly risk of stolen credentials, while providing a frictionless user experience. Although, there are dozens of new requirements when deploying which can be overwhelming. Use this guide to help you make the right decisions for your organization and users.
Posted: 10 Dec 2018 | Published: 30 Nov 2018

Ping Identity Corporation

SOC-as-a-Service versus DIY SOC
sponsored by Arctic Wolf
WHITE PAPER: Security operation centers are very useful in monitoring, detecting and responding to cyberthreats. However, they can be very expensive to build and extremely difficult to manage. Download this Frost and Sullivan report to evaluate the costs and features of SOC-as-a-service and DIY SOC to make an informed decision for your organization.
Posted: 10 Dec 2018 | Published: 31 Dec 2018

Arctic Wolf

Inner Workings of Ransomware and Ways to Detect and Respond
sponsored by Arctic Wolf
VIDEO: Ransomware hacks can bypass your perimeter controls and infect your critical systems, brining your business to a halt. Unfortunately, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. This webinar contains key insights on a ransomware cyber kill chain.
Posted: 07 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Understanding Today's SOAR Market and Offerings
sponsored by Rapid7
EBOOK: One of the fastest growing security trends right now is the adoption of security orchestration and automation systems to help teams accomplish more, at a faster pace, and with greater accuracy. Download this buyer's guide for an understanding of today's SOAR market and offerings.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Rapid7

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measureable efficiency gains can be a time-consuming task. In this white paper, learn how to make your security team successful with the help of automation.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement