Mobile Device Systems Management Reports

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

The changing mobile platform landscape
sponsored by TechTarget ComputerWeekly.com
EGUIDE: So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.
Posted: 08 Feb 2021 | Published: 18 Jan 2019

TechTarget ComputerWeekly.com

Desktop Virtualisation: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
EDITORIAL RESOURCE GUIDE: Desktop virtualisation, or virtual desktop infrastructure, has come of age, partly thanks to shifts in workplace practices. Employees are increasingly working remotely and need full access to corporate systems. It is often inconvenient to use the corporate laptop but the user still needs access to the systems offsite.
Posted: 08 Feb 2021 | Published: 14 Oct 2016

TechTarget ComputerWeekly.com

Laptop security challenges: Will smartphones be their replacement?
sponsored by Dell and Microsoft
EGUIDE: Laptops face a number of security challenges, from no log-on requirements to blank and weak passwords. Download this e-guide to learn about laptop security issues that you may not have considered or that you might be looking at from the wrong perspective.
Posted: 18 May 2018 | Published: 17 May 2018

Dell and Microsoft

The SDN Charge and the New Role in Mobile Security
sponsored by Juniper Networks, Inc.
EGUIDE: Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.
Posted: 14 Nov 2016 | Published: 11 Nov 2016

Juniper Networks, Inc.

Unifying Endpoint Management with Windows 10
sponsored by VMware
EGUIDE: A key pain point for enterprises using Windows 10 is that you need insight into which devices require updates and which already have them. Read this guide to learn about this new unified endpoint management system to empower your employees while simplifying IT's job.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware

Access e-zine: November 2017
sponsored by TechTarget Enterprise Desktop
EZINE: More end-user monitoring tools are relying on machine learning and analytics to help IT get more granular information about the end-user computing experience.
Posted: 14 Nov 2017 | Published: 14 Nov 2017

TechTarget Enterprise Desktop

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Modern Mobility - January 2017
sponsored by TechTarget Mobile Computing
EZINE: Southwest Airlines, General Electric, Telstra and Bell and Howell implemented mobility projects that made their employees' jobs easier. Learn more about the four winners of the Modern Mobility Innovation Awards.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

TechTarget Mobile Computing

How to Secure Mobile Applications in a Private Cloud
sponsored by IBM
EGUIDE: In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM