• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Resources
  • SMB Spotlight
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Resources
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find resources
      Search by title or subject area
      View all resources
  • SMB Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Mobile Phones

Samsung Galaxy S5 video review

We break down the key strengths and weaknesses of Samsung's latest Android flagship

  • Alastair Stevenson
  • Alastair Stevenson
  • @MonkeyGuru
  • 15 April 2014
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

The Galaxy S5 was unveiled by Samsung at Mobile World Congress in Barcelona in February and is listed by the company as its most business-friendly smartphone to date.

On paper there is a lot to back up Samsung's claim, with the Korean firm loading the Galaxy S5 with a custom fingerprint scanner and offering its Knox security service pre-installed.

The fingerprint scanner offers similar services to the TouchID sensor found on the Apple iPhone. The feature lets users set the Galaxy S5 to only unlock after the user has proven their identity using the fingerprint scanner.

Knox is a custom service based on the US National Security Agency's Security Enhanced Linux technology that is designed to offer IT managers a variety of management and security powers.

At its heart, Knox lets users set up a separate work area on the phone. The work areas is password protected and encrypts any data stored on it, ensuring it should remain safe if the Galaxy S5 is lost or stolen.

The Galaxy S5 also features radically upgraded internal components compared to its predecessor the Galaxy S4. Key additions include the Galaxy S5's quad-core Qualcomm Snapdragon 801 processor and 16MP rear camera.

For an indepth look at the Samsung Galaxy S5 and all its features, check out V3's full written review.

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Mobile Phones
  • Smartphones
  • Galaxy
  • Samsung
  • Android

Latest reviews

Review: The Huawei P20 Pro
Review: The Huawei P20 Pro
Dragon
Review: Dragon Professional Individual v15
Review: Samsung Galaxy S9+
Review: Samsung Galaxy S9+
Back to Top

Most read

Oracle: Java SE 8 business users must buy a licence from January next year
Oracle: Java SE 8 business users must buy a licence from January next year
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
BT plan to close down conventional fixed-line phone network by 2025 and go all-IP
Avast reveals more information detailing how hackers compromised CCleaner
Avast reveals more information detailing how hackers compromised CCleaner
Facebook Login hijacked by hidden web trackers, claim security researchers
Facebook Login hijacked by hidden web trackers, claim security researchers
AMD Ryzen CPU release dates, specs and price: Second-generation AMD Ryzen desktop CPUs available today
AMD Ryzen CPU release dates, specs and price: Second-generation AMD Ryzen desktop CPUs available today
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017