Skip to main content
Splashtop
Log inFree Trial
+1.408.886.7177Free Trial
Robert Pleasant headshot

Robert Pleasant

Content Marketing Specialist

Robert Pleasant, also known as Robbie, is a Content Marketing Specialist at Splashtop with years of experience writing for a wide array of tech companies and websites, making complex technical topics easy to understand and enjoyable with a blend of subject expertise and creative wit. He likes seeing how advancements in technology can be used to make lives better, and in his free time, Robbie enjoys creative writing, tabletop games, and trying to keep up with comics & TV shows.

Articles by Robert Pleasant

A woman smiling while using Splashtop on her laptop to work from home.
Security

How to Protect Your Business: Work From Home Security Checklist

Learn More
A man at home using Splashtop on his laptop to work securely from home.
Security

Why a Security-First Culture is Crucial for Remote Teams

A person typing on a desktop computer keyboard.
IT & Help Desk Remote Support

MDM vs EMM vs UEM: Streamlining Enterprise Device Management

A woman smiling while using Splashtop on her laptop to work remotely.
Comparisons

Why Choose Splashtop Over Competitors for Remote Access?

A woman working remotely by using a laptop.
Working Remotely

Remote Work Strategy 2026: How IT Leaders Can Lead the Shift

A person looking stressed at their work computer.
Security

How Delayed Patching Exposes Systems to Exploits and Risks

A computer showing an alert.
Security

Vulnerability Prioritization: Strategies to Manage Critical Risks

A green tree in a grass field.
Remote Access Insights

Reduce Office Carbon Footprint with Remote Access & Support Tools

A man working on a laptop computer.
Remote Access Insights

Remotely Access & Manage a Chromebook from an Android

A man working on a laptop device.
Remote Access Insights

Remotely Access Chromebooks from iPads to Streamline IT Support

A group of coworkers talking at a conference table while working on their devices.
Security

Top 10 Endpoint Security Best Practices

Coworkers using their computers and devices at a conference table.
Security

Endpoint Security Policy: What it is & How to Enforce