- July 31, 2018
There are lots of different ways to keep users up to date on the latest security risks and how they should be handling their corporate resources.
- July 31, 2018
Most IT pros are aware that user behavior can be a security threat to an organization. But what is there to do about it? With end-user security training, IT can ensure that employees are updated on the latest risks and know how to access corporate ...
- June 28, 2018
At Identiverse 2018, speakers and attendees expect a rise in two-factor authentication, as the single sign-on user password authentication falls out of favor.
- June 08, 2018
Many organizations that are good candidates for VDI have already adopted the technology. Find out how cloud and other factors are driving changes in adoption today, and how new numbers from the ...
- June 01, 2018
When I first saw the news, I was stunned. But on further analysis, AdDuplex-based Win10 uptake projections mostly bogus, reflecting an incomplete and off-kilter subset of the user base.
Sponsored by Citrix - The concept of the “digital perimeter,” or the boundary between internal systems or information and the outside world, has changed dramatically. Between 1990 and 2010, the focus was on protecting a well-defined perimeter by building “bigger walls” to keep the bad guys out. However, this approach is no longer appropriate because mobility, the cloud and constant remote access to internal systems have rendered the old concept of a true perimeter obsolete. See More
Sponsored by HPE - Historically, organisations knew what they were getting for their money when they purchased specific capacity and performance with storage platforms. But thanks to advances in storage technologies and data reduction capabilities, new features such as deduplication and compression have changed the landscape and ultimately muddied the waters. See More
Sponsored by IBM - What you don’t know about your apps can hurt you—costing you time, money and productivity. With the right UEM solution, you can use AI to gain actionable insight into app usage, performance and security to quickly and easily get your apps in gear. See More
Sponsored by Citrix - Cybersecurity is among the most important board-level issues for nearly every organization. Businesses face a double-edged sword: Not only are today’s attacks more virulent and using new attack vectors, but the penalties for a breach are now more substantial as well. See More
- May 11, 2018
As it becomes more difficult to monitor and secure applications and data, Citrix's security analytics platform is getting more attention from IT pros.
- May 09, 2018
At Synergy 2018, Citrix introduced a new secure digital workspace that provides users unified access to their virtual desktops and applications, SaaS and mobile apps, and data.
- April 25, 2018
The Windows Insider Skip Ahead Preview, aka Skippy Shows Off Lean Win10 Edition as a new SKU pops up in Build 17650.
- April 25, 2018
Application management software is a necessity for organizational continuity and security. Without any such software, absent patches threaten end users' applications.
- April 23, 2018
Based on the content of the Edge Welcome screen in Build 17134, it seems pretty safe to proclaim that Build 1803 Equals April Update.
- April 18, 2018
Court's in session, and the jury is unanimous: Automation software can help IT departments provide simpler workflows for end users on both desktops and mobile devices.
- April 17, 2018
After some confusing messaging about whether Remote Desktop Session Host would be in Windows Server 2019, Microsoft said the role will in fact be coming to the preview and official release.
- April 02, 2018
Myerson's farewell reveals interesting Win10 stats -- specifically that the total number of Win10 users is closing in on 700M with 15M members in the Windows Insider program.
- March 28, 2018
Recent updates to Chrome continue to increase its viability for business users, which could make it difficult for Microsoft's Edge web browser to take over shares of Google's in the enterprise.
- March 27, 2018
Machine learning capabilities have made applications smarter, but IT pros are still in the early days of learning AI skills. Luckily, some tools only require the knowledge of an end user.