Whitepapers
Read a selection of whitepapers and briefing notes for in-depth coverage of key topics in mobile endpoint security.

Featured Whitepaper
Living with ECH Read our report on the prospects for adoption of Encrypted Client Hello.
Download -
reading time:
Living with ECH
Read our report on the prospects for adoption of Encrypted Client Hello.Download -
reading time: 10 min
Guide to Mobile Phishing
The growth in adoption of SaaS means that your organization's most critical information is now available on phones and tablets.Read more -
reading time: 10 min
Why Google and Apple’s Malware Protection Might Not Be Good Enough
Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and...Download -
reading time: 10 min
Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?
For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading...Download -
reading time: 10 min
The rising threat of social media phishing attacks
Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital...Download -
reading time: 10 min
How to protect against an iOS hack
Mobile devices have quickly become one of the biggest targets for cyber threats such as phishing and malware attacks. The...Download