Kyle Johnson Technology Editor, TechTarget Search Security Introducing development teams to threat modeling in SDLC 22 Feb 2021 Search Enterprise Desktop How the EUC space is reacting to Coronavirus: Our big list of resources and stories (Updated 4/08) 08 Apr 2020 Search Virtual Desktop Citrix App Protection prevents keyloggers, screenshots on unmanaged devices. Here’s how it works 30 Mar 2020 Search Enterprise Desktop How zero-trust authentication and architecture have evolved 25 Mar 2020 Search Mobile Computing A look at MTD vendor Zimperium, and their new product suite, MAPS 25 Mar 2020 Search Enterprise Desktop Workspace ONE Intelligence Risk Analytics goes GA, adds dynamic conditional access to Access 23 Mar 2020 Search Mobile Computing What IT needs to know about FIDO2 iOS and Android standards 19 Mar 2020 Search Enterprise Desktop Windows on ARM revisited: Where are we in 2020? 18 Mar 2020 Search Security RSA 2020 wrap-up: VMware Carbon Black integrations; MAM for BYOD; how to handle non-employees 04 Mar 2020 Search Security Idaptive adds new remote employee onboarding option & passwordless authentication to Next-Gen Access 03 Mar 2020 Search Mobile Computing What’s the deal with Microsoft Defender for Android and iOS? 27 Feb 2020 Search Security RSA 2020 day 1: Windows 10X & secured core PCs; Hysolate updates; LastPass passwordless login 26 Feb 2020 Search Mobile Computing Will the enterprise adopt dual-screen or foldable devices? Count me among the skeptics 20 Feb 2020 Search Mobile Computing The employee experience includes dark mode. What enterprise apps have added it? 18 Feb 2020 Search Mobile Computing Consider device attestation over MDM for specific use cases 13 Feb 2020 Search Mobile Computing What did 2019 see for mobile security? More Punycode phishing, and jailbreaking returns 13 Feb 2020 Search Mobile Computing Apple’s walled garden leads to #FreeTheSandbox initiative. What is it? 11 Feb 2020 Search Enterprise Desktop What IT needs to know about Chrome extension security issues 10 Feb 2020 Search Mobile Computing A look at how Lookout integrates with Microsoft, Google, and VMware for unmanaged devices 06 Feb 2020 Search Virtual Desktop What’s new in Stratodesk’s NoTouch OS Velma Lakes release? 03 Feb 2020 Search Enterprise Desktop Okta 2020 Businesses@Work report: security and data apps see growth, companies want best of breed 30 Jan 2020 Search Security Where does 1Password Enterprise Password Manager fit in the EUC landscape? 27 Jan 2020 Search Enterprise Desktop Google is sunsetting Chrome apps. Let’s look at the Chrome OS app landscape 20 Jan 2020 Search Mobile Computing No one ever talks about Siri in the workplace. Does Apple’s assistant have a place? 16 Jan 2020 Search Enterprise Desktop Get started with VMware Workspace ONE Intelligent Hub Virtual Assistant 13 Jan 2020 Search Virtual Desktop Citrix’s employee experience focus unfolds with Workspace intelligent experience at the center 07 Jan 2020 Search Enterprise Desktop 2020 Thoughts: I want browser extension security taken seriously & I will cover more desktop virt 03 Jan 2020 Search Mobile Computing iOS 13.3 adds support for NFC, USB, and Lightning security keys 18 Dec 2019 Search Security Login.gov starts to fill the gap between social logins and enterprise identities 17 Dec 2019 Search Enterprise Desktop With HP Adaptive Device Management, you can manage Windows from the cloud—even legacy apps 10 Dec 2019 Search Virtual Desktop Vendor briefing notes: A look at Cameyo, which provides remote apps from the cloud 02 Dec 2019 Search Enterprise Desktop Google Chrome experiment crashes in RDS. What can we learn? 19 Nov 2019 Search Content Management With robotic process automation, Microsoft Power Automate works with legacy apps 11 Nov 2019 Search Virtual Desktop Microsoft Ignite 2019 news: Intune + SCCM = Endpoint Manager; WVD on Azure Stack Hub; & more 04 Nov 2019 Search Enterprise Desktop Is it acceptable to use ad blockers in the enterprise? 31 Oct 2019 Search Security How to go passwordless if not all your apps support modern authentication standards 29 Oct 2019 Search Enterprise Desktop Microsoft adds Tamper Protection to Microsoft Defender to protect against malware disabling it 24 Oct 2019 Search Security Okta competing with Microsoft, Google, and others in passwordless offerings 17 Oct 2019 Search Security NIST offers a handy vendor-neutral overview of zero trust architecture 15 Oct 2019 Search Security How far is Google going in eliminating passwords? 09 Oct 2019 Search Mobile Computing NIST offers mobility best practices guide based on COPE deployments 07 Oct 2019 Search Mobile Computing Safari 13 brings WebAuthn and drops legacy browser extensions 25 Sep 2019 Search Security When will we finally ditch passwords? Here’s Microsoft’s 4-step plan 24 Sep 2019 Search Security A look at ID proofing: bootstrapping a digital ID using a mobile device and physical ID 17 Sep 2019 Search Enterprise Desktop What are the differences between Google Chromebook Enterprise and Chrome Enterprise? 11 Sep 2019 Search Enterprise Desktop Welcome to Microsoft Desktop Analytics, the Windows Analytics successor 03 Sep 2019 Search Enterprise Desktop Jamf acquires Digita Security for macOS endpoint protection 31 Jul 2019 Search Enterprise Desktop Windows 10 security baselines finally go GA 29 Jul 2019 Search Security What's the difference between a password and a PIN? 24 Jul 2019 Search Mobile Computing iOS 13 and Android Q show mobile OSes handle security, privacy issues better than Windows used to 16 Jul 2019 Search Enterprise Desktop Google Safe Browsing can differ between desktop and mobile. Why? 08 Jul 2019 Search Virtual Desktop Raspberry Pi 4: Now the ultimate cheap thin client? 24 Jun 2019 Search Security Despite recent vulnerabilities, you shouldn’t stop using hardware security keys like Yubikey 20 Jun 2019 Search Virtual Desktop An update on the Citrix Workspace Hub: Citrix is serious about their low-cost thin client 30 May 2019 Search Virtual Desktop Client virtualization still has its fans and use cases: A look at Hysolate and Qubes OS 29 May 2019 Search Enterprise Desktop You can now see if Chrome extensions are safe with Duo’s free, new CRXcavator tool 20 May 2019 Search Security We talk a lot about access and authentication, but what about revoking user access? 07 May 2019 Search Enterprise Desktop How Google manages Chrome extensions without manually white/blacklisting each one 22 Apr 2019 Search Cloud Computing Google Cloud Next 2019: End user computing news 10 Apr 2019 Search Mobile Computing A short review of the Samsung Galaxy S10 Plus 26 Mar 2019 Search Mobile Computing Citrix and VMware are all in on ‘workflow’ apps. So, what is a workflow app? 12 Mar 2019 Search Enterprise Desktop Why can’t other apps get real-time co-authoring right like Google Docs? 05 Mar 2019 Search Enterprise Desktop How does Microsoft’s digital workspace app compare to VMware and Citrix's? 26 Feb 2019 Search Mobile Computing What we learned about mobile security from real-world mobile threat defense customer data 25 Feb 2019 Search Mobile Computing Zimperium mobile threat data shows malware is a worry but still impacts few devices 18 Feb 2019 Search Mobile Computing VMware acquires AetherPal for mobile support via screen viewing/remote control 12 Feb 2019 Search Enterprise Desktop Run potentially sketchy apps in the Windows Sandbox 31 Jan 2019 Search Enterprise Desktop What is Microsoft Intelligent Security Graph? 16 Jan 2019 Search Mobile Computing How do you block sideloaded app installation on iOS or Android? 09 Jan 2019 Search Enterprise Desktop What we learned about the new Workspace ONE Intelligent Hub and the latest in Mobile Flows 17 Dec 2018 Search Mobile Computing Wandera mobile security data shows locked-down corporate policies help lessen risk 11 Dec 2018 Search Mobile Computing How bad are mobile security threats? Our look at the numbers starts with Google and Lookout 27 Nov 2018 Search Virtual Desktop Citrix Workspace Hub: Labor of love; not a full-fledged thin client option 08 Oct 2018 Search Mobile Computing Intune Win32 app management & more EUC news from Microsoft Ignite 2018 25 Sep 2018 Search Enterprise Desktop What’s new with Workspace ONE Intelligence & Trust Network? 13 Sep 2018 Search Virtual Desktop VMworld 2018 First impressions: EUC isn’t totally ignored 30 Aug 2018 Search Security With Pwned Passwords API, annoying password policies can finally go away 15 Aug 2018 Search Mobile Computing IBM MaaS360 built a voice-based AI assistant into their email app 02 Aug 2018 Search Security Yubikey is hot in the security space, so we tested the consumer experience 02 Jul 2018 Search Mobile Computing Hey Siri: How does Apple MDM keep you from accessing corporate data? 13 Jun 2018 Search Mobile Computing Are digital assistants ready for serious enterprise use yet? 17 May 2018 1 2