RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
EZINE:
Take a look at this edition of ComputerWeekly to learn more Uber, Volkswagen, and other companies that have experience with software ethics issues, how they've dealt with them, and what the consequences have been.
EGUIDE:
Enterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.
EZINE:
The new wave of enterprise mobile application development has altered how app dev fits into IT's overall strategy. Learn how the sides can come together.
EGUIDE:
The Windows 10 MDM client consists of two primary components: one for enrolling the device, the other for managing it. Understand these two components to decide how to best manage Windows 10 Mobile devices in the enterprise.
EZINE:
Southwest Airlines, General Electric, Telstra and Bell and Howell implemented mobility projects that made their employees' jobs easier. Learn more about the four winners of the Modern Mobility Innovation Awards.
EGUIDE:
Download this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.
EGUIDE:
In this e-guide, learn about innovation in software-defined networking and network functions virtualization technologies for next-generation networks, and one IT pro's strategies for improving Wi-Fi in a device-saturated dormitory.
EGUIDE:
Download this expert e-guide to take a look at the top 5 considerations for implementing an EMM strategy, and learn how to overcome challenges such as managing too many devices, BYOD, and lack of policies.
EBOOK:
In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.