IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed   
Push Messaging Reports
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

GDPR: What it Means and How to Get Compliant
sponsored by SAS
RESOURCE: GDPR will require an ongoing, organization-wide focus to ensure you protect your customers' personal data. Any organization that does not comply could be fined up to $22 million, or 4% of their global annual revenue (whichever is greater). Access this 5-step checklist to learn how to stay GDPR-compliant.
Posted: 19 Mar 2018 | Published: 31 Dec 2017


Are You Protected Against Burst Attacks?
sponsored by Radware
RESOURCE: In this resource, get a step-by-step breakdown of burst attack detection and prevention, then learn why a system that combines on-premise and in-the-cloud protection is the best way to defend against burst attacks.
Posted: 06 Mar 2018 | Published: 15 Feb 2018


Data Classification Services and Keeping Cloud Data Secure
sponsored by Data443
EGUIDE: In this expert guide, Dave Shackleford details how data classification services can help organizations ensure their cloud data is secure.
Posted: 12 Mar 2018 | Published: 31 Aug 2016


15 Easy Ways to Integrate, Orchestrate, and Expedite Security Operations
sponsored by McAfee, Inc.
WHITE PAPER: The OpenDXL initiative puts the power of integration and automation in the hands of security analysts by providing open source tools, expertise, and a supportive community.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

McAfee, Inc.

Video: Cloud Infrastructure on IBM Power Systems
sponsored by IBM
WEBCAST: Tuning into this video grants you access to see an infrastructure platform designed to support a variety of cloud models, including private, hybrid, and public cloud. You'll learn the advantages of using this purpose-built platform, featuring OpenStack-based management and open source automation.
Posted: 07 Mar 2018 | Premiered: Nov 30, 2017


Security Trends: Data Theft and Ransomware Plague Healthcare Organizations
sponsored by IBM
WHITE PAPER: According the Cost of a Data Breach Study, the healthcare industry's data breach cost, $355 per record, is more than twice the mean across all industries of $158 per record. Inside this resource uncover how to protect your healthcare organization while reducing cost and complexity and proactively hunt and respond to threats.
Posted: 02 Mar 2018 | Published: 31 Dec 2016


Create Trusted IoT, Become the King of Sweden?
sponsored by Radware
RESOURCE: Click inside to learn about the opportunities providers have to secure vulnerabilities in IoT devices that may have been overlooked by manufacturers.
Posted: 08 Mar 2018 | Published: 25 Jan 2018


Essential Guide: Using green computing for improving energy efficiency
sponsored by
ESSENTIAL GUIDE: A guide to choosing green computing for your IT department. Learn how and why you should consider improving energy efficiency techniques within your business.
Posted: 13 Mar 2018 | Published: 13 Mar 2018

What to know about container management tools
sponsored by SearchITOperations
EBOOK: Container management tools can ease the burden of a move into containerization. Look for management software that fits your specific needs.
Posted: 19 Mar 2018 | Published: 19 Mar 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement