Smart Handheld Phones Reports

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

Gain Enterprise Mobility: Learn How Your Enterprise Can Become Mobile
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Access this white paper now to learn more about overall trends in mobility; how enterprise mobility influences the workplace and changes the way in which IT is delivered and consumed; and how to implement mobility in your enterprise.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Enterprise

Three Windows 10 upgrade questions all IT admins should ask
sponsored by vmware airwatch
EGUIDE: Upgrading to Windows 10 is no small undertaking. There are several critical questions all IT admin should ask before making the move to Windows 10. Understand what's different in Microsoft's latest operating system, and the keys to managing Windows 10 mobile devices.
Posted: 27 Mar 2017 | Published: 22 Mar 2017

vmware airwatch

Mobile Application Delivery: The Next Frontier (An Expert Handbook on Mobile Application Management)
sponsored by TechTarget Security
EBOOK: This expert handbook features three articles that examine the best approaches to take when delivering mobile applications.
Posted: 03 Feb 2014 | Published: 03 Feb 2014

TechTarget Security

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

Laptop security challenges: Will smartphones be their replacement?
sponsored by Dell and Microsoft
EGUIDE: Laptops face a number of security challenges, from no log-on requirements to blank and weak passwords. Download this e-guide to learn about laptop security issues that you may not have considered or that you might be looking at from the wrong perspective.
Posted: 18 May 2018 | Published: 17 May 2018

Dell and Microsoft

Best Practices for Getting the Most Out of Mobile ERP and Integrating WMS into Existing ERP Software
sponsored by IFS
EGUIDE: As businesses sign up for mobile ERP, they soon find they need a good WMS software to match. Explore ways to get the most out of your integration choices.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

IFS

Do Mobile Enterprise Services Increase BYOD Initiatives' Chances of Success?
sponsored by IBM
RESEARCH CONTENT: This Forrester research report explores the impact of a leading company's mobile enterprise services on the success of BYOD initiatives in two large organizations.
Posted: 17 Jun 2015 | Published: 31 May 2013

IBM

Guidelines for deploying Citrix BYOD solutions
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines how to formulate a successful, service-oriented BYOD model and how you can define and deploy the mobile approach that is right for your organization.
Posted: 12 Feb 2014 | Published: 12 Feb 2014

Citrix