Smart Handheld Phones Reports

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

Computer Weekly – 8 October 2019: Showcasing the potential of 5G
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit an ambitious trial in Bristol that is showcasing the possibilities offered by 5G roll-out. We look at how emerging automation technologies are enhancing the use of identity and access management tools. And we assess the Government Digital Service plan for transforming public services. Read the issue now.
Posted: 08 Feb 2021 | Published: 08 Oct 2019

TechTarget ComputerWeekly.com

CW ASEAN: Preparing for 5G
sponsored by TechTarget ComputerWeekly.com
EZINE: As telcos gear up to roll out the first 5G networks, enterprises are keen to see how they can take advantage of faster 5G networks to support a broad range of applications. In this edition of CW ASEAN, we look at how enterprises in ASEAN are readying themselves for 5G to take advantage of the new technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Aug 2018

TechTarget ComputerWeekly.com

Digital secure remote payment: How Apple Pay can change the future of remote payments
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
Posted: 08 Feb 2021 | Published: 27 Mar 2018

TechTarget ComputerWeekly.com

Secure Mobility Survey Findings Report
sponsored by Dimension Data
WHITE PAPER: Find out about the gap that exists between the enterprise mobility vision and real-would implementations, and uncover a complete list of recent survey results.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Dimension Data

Move Beyond Point Solutions to Complete EMM
sponsored by Citrix
WEBCAST: This informative webcast discusses the problems associated with point solutions and examines how and why your organization should move past these tools to a complete enterprise mobility management (EMM) solution.
Posted: 13 May 2014 | Premiered: May 13, 2014

Citrix

Jack Gold: The Enterprization of Mobile Apps: Moving from Corporate Liability to Business Asset
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines a mobile management strategy that can enable your organization to plan, implement and operate the most cost-effective applications with the greatest degree of security and user productivity. Read on to learn more.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Citrix

Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER: This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012

Cisco

Top Considerations for Collaboration in the IoT and Mobile Era
sponsored by Citrix
EGUIDE: Explore what key considerations to keep in mind when selecting the collaboration tools for your organization. Factoring in trends like increased cloud, mobile, and especially IoT adoption, find out how to evaluate collaboration tools for integration with third party apps, enterprise content search, AI, automation, and more.
Posted: 24 Oct 2017 | Published: 19 Oct 2017

Citrix

Mobile Application Delivery: The Next Frontier (An Expert Handbook on Mobile Application Management)
sponsored by TechTarget Security
EBOOK: This expert handbook features three articles that examine the best approaches to take when delivering mobile applications.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

TechTarget Security