Smartphones Reports

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

CW Middle East Jan to Mar 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: The Middle East is investing heavily in IT to make life better for its population. Smart city developments are an example. But read in this issue how in the Middle East, where there is a growing population and a rise in lifestyle-related disease, IT is being used to support the healthcare system.
Posted: 08 Feb 2021 | Published: 11 Jan 2018

TechTarget ComputerWeekly.com

Taking Mobile Delivery to the Next Level with NetScaler MobileStream
sponsored by Citrix
WHITE PAPER: This exclusive paper examines an enterprise mobility solution that combines a suite of multi-layer optimizations purpose-built to accelerate mobile service delivery with an essential collection of secure access and threat protection capabilities.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Citrix

10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 09 May 2014 | Published: 01 Jun 2014

Citrix

Are You Ready for the Future of IT?
sponsored by Cisco Systems, Inc.
WHITE PAPER: The Internet of Everything is here: More people, processes, data and things are connecting. Learn why you should embrace this new model.
Posted: 21 Aug 2014 | Published: 14 Mar 2014

Cisco Systems, Inc.

6 Components of Mobility Management Software
sponsored by Microsoft
EGUIDE: As enterprise mobility increases in adoption, formal mobile policy management systems are fading from the scene. In this e-guide, mobile computing expert Craig Mathias simplifies the broad range of management capabilities available for you to enable both flexibility and security.
Posted: 14 Jun 2016 | Published: 09 Jun 2016

Microsoft

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

IBM

Critical Capabilities for Mobile Device Management
sponsored by Citrix
WHITE PAPER: This informative resource takes an in-depth look at the top mobile device management (MDM) technologies and examines the effectiveness of their critical capabilities. Read on to find out which MDM solution would fit best into your environment.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Citrix

Assess your mobile infrastructure
sponsored by IBM
ASSESSMENT TOOL: This informative resource provides a helpful self-assessment so you can identify areas where you can improve the IT infrastructure that supports mobility within your organization so you can enhance your mobile environment.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM

How to get more from BYOD
sponsored by Cisco
WHITE PAPER: This exclusive paper examines a set of mobile solutions designed to enable BYOD environments by combining best-of-class technology, validated designs, and end-to-end support.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Cisco