Search Results:
1-15 of 7686 results

Wearable devices to fuel second wave of biometric adoption

Global wearable biometric technology users to hit 604 million by 2019.

Mobile & tablets

Published 31 October 2014

Samsung kicks off mobile comeback with 'slimmest' smartphones

Launching in China, the A3 and A5 will feature an all-metal jacket.

Mobile & tablets

Published 31 October 2014

5 startling but real mobile security risks

Think you know the biggest business risks of tablets and smartphones? Think again…

Mobile & tablets

Published 30 October 2014

85% of enterprises not prepared to meet mobile demands

But 60% know mobility management is critical.

Mobile & tablets

Published 30 October 2014

Global smartphone shipments surpass 300 million

Second successive quarter - top five vendor list .

Mobile & tablets

Published 30 October 2014

Samsung rethinking smartphone strategy after sales slump

Poor quarter could mean worst year for the phone maker since 2011.

Mobile & tablets

Published 30 October 2014

Honor launches 'world's fastest smartphone'

Will only be sold through Amazon.com to appeal to 'digital natives'.

Mobile & tablets

Published 29 October 2014

Huawei launches Honor 4X in China

5.5-inch mid-range smartphone with a 13MP snapper.

Mobile & tablets

Published 29 October 2014

Six biggest mobile threats for businesses

Eldar Tuvey, CEO of Wandera, discusses the six most concerning mobile threats for businesses, and offers advice on how they can be combatted.

Mobile & tablets

Published 29 October 2014

The benefits of UC for blue light services

Intrinsic tells us why emergency services are using unified communications.

Mobile & tablets

Published 29 October 2014

BYOD security incidents skyrocket with growing adoption

More than half of IT organisations handled business data on employee-owned devices.

Mobile & tablets

Published 29 October 2014

Screenshots of HTC Sense 7 UI leaked

The screenshot shows flat design with contrasting accent colours.

Mobile & tablets

Published 28 October 2014

ARM releases new low-energy processor suite

New Mali media IP suite 'to cut energy consumption of smartphones'.

Mobile & tablets

Published 28 October 2014

New platform to synch Android devices

Initially being offered for CyanogenMod users.

Mobile & tablets

Published 28 October 2014

Details of Samsung Galaxy A7 leaked

The phone is expected to support both 32 and 62-bit computing.

Mobile & tablets

Published 27 October 2014

1-15 of 7686 results

Join our network

755 people like this.
0 people follow this.

CBR Supplier Recommendations

See more

CBR White Paper Recommendations

  • PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks

    03 November 2010 | By Absolute Software

    Absolute Software*1 and Intel deliver a new level of theft deterrence and data defence through integrated hardware and software technologies for notebook PCs. Computrace,* a leading IT asset-management and security solution from Absolute Software, is taking advantage of Intel® Anti-Theft Technology (Intel AT) 2 which is designed into system hardware. Through Computrace, an authorised information technology (IT) administrator can remotely delete data on a notebook, or the notebook can now intelligently lock itself down and prevent an OS from booting. If the notebook is reported lost or stolen, the IT administrator simply flags it in the Computrace web portal and sets up a "poison pill" so the next time the notebook "phones home", it will be disabled. In both cases, whether the notebook locks itself down or receives a poison pill, and even if the hard drive is reformatted or replaced, anti-theft security options remain in place. Getting the system operational again is easy – authorised users can quickly restore the system with a one-time reactivation token provided by the IT department. IT now has a more reliable, robust approach to protecting assets and minimising financial and/or legal risk from lost or stolen notebooks....

    White Papers
  • The Human Factor in Laptop Encryption: UK Study

    03 November 2010 | By Absolute Software

    Encryption is one of the most important security tools in the defense of information assets. Ponemon Institute has conducted numerous studies on organizations’ use of encryption to prevent the loss of sensitive and confidential information. These studies have shown that encryption can be an effective deterrent. However, our studies also show that in order to be effective, encryption requires organizations and users to take appropriate steps to make sure sensitive and confidential information is protected as much as possible. Download this free white paper to read more....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.