IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed   
SMS Spam Reports
 
The Financial Adviser's Guide to Social Media Strategy and Policy
sponsored by Smarsh
WHITE PAPER: The U.S. Securities and Exchange Commission (SEC) and Financial Industry Regulatory Authority (FINRA) recognize social media’s growing role in firms’ marketing strategies. In this guide, find practical steps to help you develop social media strategy and policy that meets social media recordkeeping and supervision regulatory requirements.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Smarsh

What to Look for in a Zero Trust Solution in 2020
sponsored by PortSys
WHITE PAPER: The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

PortSys

MicroScope – December 2019: Time for change
sponsored by MicroScope
EZINE: In this issue, we ask experts how they're approaching digital transformation to meet customers demand, and we look at whether the actions of the user should reflect on the accountability of the cloud provider
Posted: 04 Dec 2019 | Published: 06 Dec 2019

MicroScope

User Lifecycle Management Proves Costly to IT
sponsored by Okta
WHITE PAPER: An IDG survey reveals that manual processes drain productivity and increase security risks. Read on to learn more about the differences between manual versus automated lifecycle management.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Data protection, a live issue that affects us all
sponsored by ComputerWeekly.com
EGUIDE: Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

Electronic Communications Compliance Survey Report
sponsored by Smarsh
ANALYST REPORT: Regulatory oversight is growing more sophisticated as the communications technology landscape continues to evolve. In this 2019 research report, Smarsh revels key findings from a survey of financial services professionals responsible for the retention, archiving, and oversight of electronic communications.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

Native Persistent Data Orchestration for Kubernetes
sponsored by HammerSpace
DATA SHEET: Download this datasheet to view a data management approach equipped to deliver the agility, control, and efficiency that Kubernetes workloads require, abstracting data at file-level granularity from the infrastructure so that any storage system can natively serve data to Kubernetes persistent volumes.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

HammerSpace

Banyan Security Zero Trust Remote Access Video
sponsored by Banyan Security
VIDEO: In this video, learn about a singular Zero Trust remote access platform that delivers dynamic trust scoring, continuous authorization and granular access enforcement.
Posted: 02 Dec 2019 | Premiered: 02 Dec 2019

Banyan Security

Transform the Customer Experience with a Modern Customer IAM Solution
sponsored by Okta
WHITE PAPER: Customer identity and access management (CIAM) allows businesses to keep pace with the growing range of customer interaction interfaces while maintaining security and scalability. In this white paper, explore the growing range of channels driving the need for CIAM and uncover Gartner’s key trends for CIAM solution design.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

How to Save Your Failing IT Projects and Deployments
sponsored by Goliath
VIDEO: Tune into this half-hour webinar to learn how proactive monitoring and troubleshooting tools can keep your IT deployments running smoothly – and can prevent IT projects from failing.
Posted: 26 Nov 2019 | Premiered: 29 Oct 2019

Goliath
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement