SHD Reports

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

Mobile World Congress 2019: The year 5G use cases got real
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will examine some of the bigger themes that emerged over the course of Mobile World Congress 2019 - which now attracts over 100,000 people every year.
Posted: 05 Dec 2019 | Published: 12 Mar 2019

TechTarget ComputerWeekly.com

BYOD: Balance mobile freedom with enterprise security
sponsored by IBM
WHITE PAPER: This exclusive paper examines how your organization can best introduce mobile devices into the workplace in a secure manner, identifying the risks inherent in their broader access to corporate data while deriving enhanced business value.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

IBM

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Enterprise Mobility Planning Guide: Increase Mobile Productivity
sponsored by Intel
WHITE PAPER: This crucial white paper examines how to build a mobile environment that will increase productivity across your business while delivering the added security you need to protect your sensitive information.
Posted: 19 May 2014 | Published: 19 May 2014

Intel

Mobile IAM™: The “BYOD Done Right™” Solution
sponsored by Extreme Networks
WHITE PAPER: This exclusive resource examines a comprehensive BYOD solution that provides security, full IT control, and reliable network experience for all users.
Posted: 22 May 2014 | Published: 22 May 2014

Extreme Networks

Mobile Device Management Checklist
sponsored by Citrix
EGUIDE: This expert guide from SearchConsumerization.com provides a mobile device management (MDM) checklist your organization can utilize in order to ensure successful mobility deployments and management.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Citrix

Common Use of Mobile Devices Makes Strong Case for Strong BYOD
sponsored by TigerText, Inc.
EGUIDE: Access this expert e-guide from SearchHealthIT.com to learn more about the benefits and challenges to consider before implementing BYOD policies.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

TigerText, Inc.

How Mobile Backend as a Service (MBaaS) Can Unleash Apps for the New Style of IT
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Mobile Backend as a Service is a set of cloud-based, server-side mobile services for multiple platforms that can be used as a back end for your mobile apps. Find out how it can benefit you.
Posted: 02 Sep 2014 | Published: 30 May 2014

Hewlett-Packard Enterprise

The Keys IT Needs to Manage Windows 10 Mobile Devices
sponsored by vmware airwatch
EGUIDE: The Windows 10 MDM client consists of two primary components: one for enrolling the device, the other for managing it. Understand these two components to decide how to best manage Windows 10 Mobile devices in the enterprise.
Posted: 27 Mar 2017 | Published: 17 Mar 2017

vmware airwatch