Search Enterprise Desktop
Login Register
Informa TechTarget Explore the Network
  • Virtual Desktop
  • Mobile Computing
  • CIO
  • Security
  • Information Week
An Informa TechTarget Publication Explore our brands
  • Search Enterprise Desktop
    • Alternative OSes
    • Application Management
    • Desktop Management
    • Unified Endpoint Management
    • Windows OS & Management
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

News

Vendor Resources
  • Anatomy Of An Attack –White Paper
  • Defense-In-Depth: Closing Gaps In Security By Integrating And Layering Solutions –White Paper
  • Security 360: Annual Trends Report Mobile Devices –Research Content
Latest TechTarget resources
  • Virtual Desktop
  • Mobile Computing
  • CIO
  • Security
Search Virtual Desktop
  • How to ensure webcam functionality on remote desktops

    As distributed workforces become the norm, more employees use remote desktops. To support these workers, IT must be able to set ...

  • Configuring folder redirection works with roaming profiles

    Folder redirection helps keep user files out of roaming profiles, improving consistency and reducing profile bloat in virtual ...

  • How to address roaming profiles with GPOs

    Roaming profiles can personalize nonpersistent virtual desktops, but IT should plan GPOs, folder redirection, profile versions ...

Search Mobile Computing
  • 3 BYOD security risks and how to prevent them

    BYOD security risks now extend beyond lost phones and malware. Organizations should focus on identity, app protection, device ...

  • What can organizations do to address BYOD privacy concerns?

    BYOD privacy concerns focus on the extent of IT's access to personal devices. Clear policies, selective management, and ...

  • Understanding BYOD policy enforcement and creation

    A modern BYOD policy should balance user privacy with app, access and device controls that protect corporate data on personal ...

Search CIO
  • Is AI really cheaper than human workers?

    Enterprise AI promises cost savings, but hidden expenses often exceed projections—and sometimes surpass the salaries of workers ...

  • Weekly tech news: Musk lawsuit verdict, Anthropic acquisition, Meta layoffs and billions for quantum

    Stay up to date with the latest U.S. tech news, IPOs and executive moves shaping the industry each week.

  • Strategic IT outlook: Tech conferences and events calendar

    Tech conferences are a vital way for CIOs and IT leaders to keep abreast of trends and make real-life connections in a ...

Search Security
  • Identity security for AI agents: The proliferation challenge

    Identity teams can accelerate AI adoption with strong security foundations. But managing nondeterministic AI agents is different ...

  • Taking care of business: The CISO's role in a cyber crisis

    CISOs have a broad range of responsibilities. But when a crisis occurs, they become the de facto leader, entrusted with both ...

  • What CISOs need to know about AI audit logs

    AI audit logs are rapidly becoming essential tools for enterprise CISOs. Here's what cybersecurity leaders need to track to ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close