Smart Handheld Devices Reports

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

CW ASEAN: Preparing for 5G
sponsored by TechTarget ComputerWeekly.com
EZINE: As telcos gear up to roll out the first 5G networks, enterprises are keen to see how they can take advantage of faster 5G networks to support a broad range of applications. In this edition of CW ASEAN, we look at how enterprises in ASEAN are readying themselves for 5G to take advantage of the new technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Aug 2018

TechTarget ComputerWeekly.com

Microsoft Skype for Business Online: Features, Costs and Office 365 Integration
sponsored by Dimension Data
EGUIDE: Microsoft has introduced cloud PBX with PSTN calling features to Skype for Business Online, which is expected to put it on par with other UCaaS products. This e-guide gives an in-depth look at how Skype for Business continues to evolve in a full-fledged unified communications service with features including, calling, conference and collaboration.
Posted: 06 Sep 2016 | Published: 01 Sep 2016

Dimension Data

How a unified workspace solution is built for hybrid environments
sponsored by NComputing
VIDEO: Most employees want a tablet system that can combine their personal assets with business applications and files. This video gives you an in-depth look at a unified workspace for your tablet. See how a leading vendor can help to allow your tablet to make it accesible for both personal assets and business applications in a securely fashion.
Posted: 06 Oct 2014 | Premiered: 01 Oct 2014

NComputing

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Latest IT Trends For Secure Mobile Collaboration
sponsored by Cisco
WHITE PAPER: This Forrester study of IT mobility decision-makers investigates current trends in corporate mobility that impact every company.
Posted: 02 Apr 2014 | Published: 30 Sep 2013

Cisco

Managing Communications for the World of BYOD: Deploying the Right Technology for Today's Mobile World
sponsored by RingCentral
WHITE PAPER: This Frost & Sullivan report outlines a key solution that enables mobile workers to experience constant access to business assets while using personal devices. Click through to learn how cloud-based communications services can reduce risk and high cost factors.
Posted: 17 Feb 2014 | Published: 17 Feb 2014

RingCentral

Three Windows 10 upgrade questions all IT admins should ask
sponsored by vmware airwatch
EGUIDE: Upgrading to Windows 10 is no small undertaking. There are several critical questions all IT admin should ask before making the move to Windows 10. Understand what's different in Microsoft's latest operating system, and the keys to managing Windows 10 mobile devices.
Posted: 27 Mar 2017 | Published: 22 Mar 2017

vmware airwatch

The Evolution of IoT Analytics and Big Data
sponsored by Vitria Technology, Inc.
EGUIDE: In this e-guide, Sisense co-founder Adi Azaria and Machina Research analyst Emil Berthelsen examine the current state of IoT analytics as well as where it's heading next. Learn about the impact IoT is having on everything from Hadoop big data platforms to real-time BI capabilities.
Posted: 17 Jul 2017 | Published: 12 Jul 2017

Vitria Technology, Inc.

Critical Capabilities for Mobile Device Management
sponsored by Citrix
WHITE PAPER: This informative resource takes an in-depth look at the top mobile device management (MDM) technologies and examines the effectiveness of their critical capabilities. Read on to find out which MDM solution would fit best into your environment.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Citrix