December 22, 2015
ICYMI: A serious breach in Juniper firewalls spurs industry and government reaction; Gartner names three APM leaders; and Savvius targets twin-stream packet capture for WLAN device.
December 17, 2015
As 2015 draws to a close, the staff of TechTarget's end-user computing sites took to Slack and held an hour-long chat about the year's biggest trends. Over the next few days, we'll bring you ...
August 11, 2015
Microsoft wastes no time delivering its first critical Windows 10 Patch Tuesday fixes, along with critical updates for its Edge and IE browsers.
June 02, 2015
Researchers estimate that 70% of organizations will have implemented virtual servers by the end of 2015, representing a tipping point in enterprises’ adoption of virtualization. Virtual machines (VMs) must be protected from malware like other systems but attackers are coming up with new ways to avoid detection and analysis. Security researchers have long used VMs to isolate and analyze malware, which has led to the misconception that malware disappears once it detects a VM. We look at how malware is adapting to virtual networks, and at the tools and processes that can help organizations secure these environments.
Meanwhile, rogue activity of insiders continues to surprise Fortune 1000 companies. According to some studies, 80% of cybersecurity breaches are aided and abetted by insiders. Yet many CIOs continue to remain skeptical about investments in employee cybersecurity awareness training. New technologies now focus on user credentials, employee actions and behavior analytics. We look at the security culture in today's organizations and effective strategies to improve visibility, policy and prevention of insider threats.
A new class of endpoint threat detection products is designed to improve visibility across endpoints, hunt for threats, automate incident response and cut down on false alerts overwhelming security teams. How do they work? We interview CSOs who have invested in endpoint defense and remediation tools and share their views on the pros, cons and common deployment scenarios.
USB Get Started
Bring yourself up to speed with our introductory content
USB-C is a connection type standard designed to replace all USB types on the computer and device ends of future USB with a single reversible connector. Continue Reading
When it comes to USB device redirection, IT administrators must pay close attention to network bandwidth, latency and reliability issues. Continue Reading
A new feature in XenDesktop and XenApp makes it easier for stylus users, artists and engineers to link USB peripheral devices to their virtual desktops and applications, even when they're far away from the office. Continue Reading
Evaluate USB Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The Android manufacturer's latest tablet, the Samsung Galaxy TabPro S, goes head to head with Microsoft's Surface Pro. Get to know the most important features and why business users should consider it. Continue Reading
Workers want to use their USB devices with virtual desktops, but to match the performance of a physical PC, IT has to provide a strong network connection and overcome the various hurdles of VDI software. Continue Reading
Enabling USB redirection can help win over virtual desktop users, but IT has to be smart about how it treats devices that can cause performance issues, such as scanners and webcams. Continue Reading
Learn to apply best practices and optimize your operations.
Take this quiz to test your knowledge of remote desktop USB redirection, including the ins and outs of Citrix's USB redirection features and which devices raise red flags. Continue Reading
USBs can create a vulnerable entry point for cyberattacks in healthcare. One CIO details the nuances of the problem and offers up possible solutions. Continue Reading
Network printing offers advantages, including faster, more direct access and no need to for a running Windows client for print access. Continue Reading
Problem Solve USB Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows 10 has as many problems as any other OS before it, including startup speed issues, Windows defender failures, device driver issues and more. Continue Reading
A rootkit was found and you think you've removed it, but how do you confirm it? Enterprise threats expert Nick Lewis explains the next steps to ensure rootkit removal. Continue Reading
Windows To Go only works for Windows 8 bootable USB flash drives; to create a virtual hard drive for Windows 7 installation, try Boot to VHD. Continue Reading