![Yanlin Wang, VP of Advanced Technology](https://images.ctfassets.net/5i1m3im8l2b5/6g5UXbDnCf1mLHRvpzGZip/f6e99c57f2775f9163874ad9ba487dab/Yanlin-Wang-Splashtop.jpeg?w=120&h=120&fl=progressive&q=75&fm=jpg&fit=fill)
Yanlin Wang
VP of Advanced Technology
As VP of Advanced Technology at Splashtop, Yanlin Wang is the driving force behind the Splashtop Secure Workspace. With over 20 years of leadership experience with companies like Fortinet, Centrify, and ArcSight/HP Software – Yanlin has remained at the forefront of the security technology space, with proven experience building award-winning software and top-tier teams. His strong business acumen is evidenced by his multiple patents and contributions to global M&A transactions. Away from the corporate world, his interests include running, table tennis, and calligraphy.
Articles by Yanlin Wang
![A computer, tablet, and laptop on a desk with multiple apps open.](https://images.ctfassets.net/5i1m3im8l2b5/61f16xcehQcmcQ9V61sCmo/fda7e4910de2a0a6efb812f4a0c077e1/mastering-web-app-security.jpg?w=300&h=200&fl=progressive&q=75&fm=jpg&fit=fill)
Secure Workspace
Mastering Web App Security with Splashtop Secure Workspace
![An IT admin at his computer using Splashtop Secure Workspace.](https://images.ctfassets.net/5i1m3im8l2b5/3cvx2yV7zDyXPS8o5I9B5g/64494a2a2f82c0a6f1d456e53afeec72/ssw-admin-experience.jpg?w=300&h=200&fl=progressive&q=75&fm=jpg&fit=fill)
Secure Workspace
Transforming Secure Access — The Splashtop Secure Workspace Admin Experience
![A laptop screen with code being typed on it.](https://images.ctfassets.net/5i1m3im8l2b5/VQnm1AZcXq8G3VPDKSKMH/a54b81b4c50de0b931c9367feedf7e83/mitigate-xz-backdoor.jpg?w=300&h=200&fl=progressive&q=75&fm=jpg&fit=fill)
Secure Workspace
How to Mitigate XZ Backdoor Supply Chain Attack
![A man sitting at a desk using his laptop.](https://images.ctfassets.net/5i1m3im8l2b5/7K2C6GIg7aq1gDrPBYaBzL/2acd727cb70415edbf27973abb16fcad/ssw-just-in-time.jpg?w=300&h=200&fl=progressive&q=75&fm=jpg&fit=fill)
Secure Workspace
Securing Third-Party Access: Splashtop's Just-In-Time Approach
![Two workers at their workstations using their computers in an office.](https://images.ctfassets.net/5i1m3im8l2b5/5EjZo57yrR9hJl8nuKuSfF/e9eddee0e61125b4264877a4d384038a/applications-ssw.jpg?w=300&h=200&fl=progressive&q=75&fm=jpg&fit=fill)
Secure Workspace
Transforming Secure Access: Real-World Applications of Splashtop Secure Workspace
![A group of employees sitting around a table and using several devices including laptops, tablets, and smartphones.](https://images.ctfassets.net/5i1m3im8l2b5/qCyEQAKNTeQFCsUkyzqn1/54e745003ebf38cde2d84140e25d1f12/transforming-secure-access-splashtop-secure-workspace.jpg?w=300&h=200&fl=progressive&q=75&fm=jpg&fit=fill)
Secure Workspace
Transforming Secure Access with Splashtop Secure Workspace
![Hands typing on a keyboard.](https://images.ctfassets.net/5i1m3im8l2b5/4fIp03lZUF2O7ulFuHJJjH/d1f1e8b57a697eebc111589da2efb8b9/secure-access-generative-ai.jpeg?w=300&h=200&fl=progressive&q=75&fm=jpg&fit=fill)
Secure Workspace