Search Enterprise Desktop
Login Register
Informa TechTarget Explore the Network
  • Virtual Desktop
  • Mobile Computing
  • CIO
  • Security
  • Information Week
An Informa TechTarget Publication Explore our brands
  • Search Enterprise Desktop
    • Alternative OSes
    • Application Management
    • Desktop Management
    • Unified Endpoint Management
    • Windows OS & Management
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

Manage

Learn to apply best practices and optimize your operations.

Vendor Resources
  • From data models to data meaning: Why the future of data modeling is now –Talk
  • Endpoint Security for AI eBook –eBook
  • Modernize your workplace with a trusted, reliable partner –Infographic
Latest TechTarget resources
  • Virtual Desktop
  • Mobile Computing
  • CIO
  • Security
Search Virtual Desktop
  • Configuring folder redirection works with roaming profiles

    Folder redirection helps keep user files out of roaming profiles, improving consistency and reducing profile bloat in virtual ...

  • How to fix keyboard connection issues on a remote desktop

    When a remote desktop keyboard stops responding, IT admins should check local hardware, client settings, keyboard layout ...

  • 6 steps for when remote desktop credentials are not working

    When remote desktop credentials fail, admins should verify account format, cached credentials, lockout status, access permissions...

Search Mobile Computing
  • 3 BYOD security risks and how to prevent them

    BYOD security risks now extend beyond lost phones and malware. Organizations should focus on identity, app protection, device ...

  • What can organizations do to address BYOD privacy concerns?

    BYOD privacy concerns focus on the extent of IT's access to personal devices. Clear policies, selective management, and ...

  • Understanding BYOD policy enforcement and creation

    A modern BYOD policy should balance user privacy with app, access and device controls that protect corporate data on personal ...

Search CIO
  • Strategic IT outlook: Tech conferences and events calendar

    Tech conferences are a vital way for CIOs and IT leaders to keep abreast of trends and make real-life connections in a ...

  • How CIOs move from AI experimentation to operationalization

    MIT Sloan CIO Symposium panelists reveal how businesses are operationalizing AI at scale. Celigo CIO Amy Farrow shares critical ...

  • The Meta warning: When AI spending becomes a liability

    Meta's stock dropped 10% after it revealed higher AI costs. CIOs must prove AI investments deliver value, and AI spending is not ...

Search Security
  • Taking care of business: The CISO's role in a cyber crisis

    CISOs have a broad range of responsibilities. But when a crisis occurs, they become the de facto leader, entrusted with both ...

  • What CISOs need to know about AI audit logs

    AI audit logs are rapidly becoming essential tools for enterprise CISOs. Here's what cybersecurity leaders need to track to ...

  • SOC vs. MDR: What CISOs need to consider

    Security operations centers and managed detection and response providers differ in how they manage threats. What's the best way ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close