IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed   
SMS Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Encrypted Traffic: Making What's Vulnerable More Visible
sponsored by F5 Networks
WHITE PAPER: This white paper explores how to update your SSL/TLS strategy for the increasing payload of encrypted attacks. Get tips on how to improve your cryptographic posture so that you can make sure your SSL/TLS strategy is able to decrypt and encrypt traffic while routing it intelligently across security inspection devices.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

The Forrester Wave: Managed Security Services Providers (MSSPs)
sponsored by Dell SecureWorks
RESOURCE: This Forrester report covers a 26-criterion evaluation of European management security service providers (MSSPs). It identified the most significant MSSPs along with researching, analyzing and scoring them. The report also shows how each provider measures up and helps security leaders make the right choice.
Posted: 11 Dec 2018 | Published: 19 Nov 2018

Dell SecureWorks

The Real Business Drivers of Data Compliance
sponsored by Micro Focus
WHITE PAPER: Although fines and reputational damage are frequently stated as instigators of action to adopt GDPR, this white paper reveals a broader set of rationales for engagement. Learn more about the advantages of GDPR in terms of compliance, operational efficiency and revenue.
Posted: 04 Dec 2018 | Published: 31 Jul 2018

Micro Focus

Managing Mobile Risk in Healthcare
sponsored by MobileIron
RESOURCE: It's extremely important in the healthcare industry for organizations to secure their endpoints – mobile devices included. In this resource, learn how you can use a threat defense application to enhance the security and privacy of your endpoints and protect patient data against cyberattacks.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

MobileIron

4 Critical Features of a Cyber-Resilient Architecture
sponsored by Dell EMC and Microsoft
RESOURCE: To protect your servers against cyber-attacks throughout their lifecycle, industry analysts recommend implementing four practices into your hardware security strategy. Keep reading to learn all 4.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

Dell EMC and Microsoft

Complete Guide to Cloud Security in Health IT
sponsored by Virtustream
EGUIDE: In this e-guide, uncover 4 ways that cloud service providers offer advanced protection. You'll also learn about the benefits and drawbacks of considering a cloud-based EHR system.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

Virtustream

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: As the technology we use at work expands, speed has never been more important for security operations teams. Security orchestration and automation is becoming a vital aspect of many organizations' security strategies. In this white paper, learn how many companies are using it to successfully tackle common security processes and investigation types.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

Improving People's Health through Seamless Integration with Activity Meters
sponsored by HULFT
CASE STUDY: Download this case study to learn how one company used HULFT to provide the right level of security to ensure utmost confidentiality with regards to patient data, and how they saw success in one-third of the traditional development timeframe.
Posted: 10 Dec 2018 | Published: 10 Dec 2018

HULFT

How a Modern IT Infrastructure Helps Organizations Grow
sponsored by Citrix
WHITE PAPER: Explore the impact that a modernized IT infrastructure can have on business growth, and find out how IT executives are tackling major pain points that often accompany an out-of-date, lackluster infrastructure.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement