Searching all of TechTarget| 121,921 results for "user"

SearchEnterpriseDesktop

By Ed Tittel News Oct 24, 2016

Factoring Out Xbox in Active User Count

When MS counts Windows 10 users, Xbox users are included. They recently published numbers that make factoring out xbox users easier. Continue Reading

SearchExchange

By Jonathan Hassell Manage Dec 02, 2016

Access for Office 365 external users a concern for admins

Microsoft added external access for Office 365 Groups, which means administrators must contend with confidentiality and lifecycle issues until the service matures. Continue Reading

SearchSecurity

By Michael Cobb Get Started Dec 01, 2016

Test your privileged user management knowledge

Test your proficiency in privileged user management. Take this quiz to determine your ability to keep privileged access secure across your organization. Continue Reading

SearchCIO

By Linda Tucci Get Started Nov 29, 2016

Jump on robotics process automation -- before your users do

Robotics process automation ranks high on the hype scale these days. It shouldn't. Marc Tanowitz of Pace Harmon explains. Continue Reading

SearchVirtualDesktop

By Ramin Edmond News Sep 22, 2016

User environment management market heats up

User environment management is a key part of controlling users' virtual desktop profiles and settings. To catch up with the likes of VMware and LANDesk, Citrix made its own UEM acquisition this month. Continue Reading

ComputerWeekly

By Ai Lei Tao Sep 13, 2016

Number of internet users in Myanmar rockets

Internet use rapidly increases in Myanmar, with most people connecting through smartphones Continue Reading

MicroscopeUK

By Simon Quicke Nov 15, 2016

Users are still worried about cloud security

Worries about cloud security and data privacy remain a stumbling block for cloud adoption Continue Reading

SearchAWS

By Stephen J. Bigelow Get Started Nov 14, 2016

When to use AWS IAM roles vs. users or groups

We have restrictions imposed on in-house IT staff with AWS Identity and Access Management. How do IAM roles protect access to services, applications and end users? Continue Reading

SearchDataCenter

Manage Nov 10, 2016

SearchSecurity

By Michael Cobb Manage Nov 10, 2016

Preventing trusted users from misusing their privileges

Users with privileged accounts have the ability to make critical changes to your enterprise system. Find out how to control trusted users and prevent malicious actions. Continue Reading