• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Author:bhuvaneswari.kg@zohocorp.com

  • bhuvaneswari.kg@zohocorp.com
    bhuvaneswari.kg@zohocorp.com
    Scattered Spider: Weaving an ever expanding web of cybercrimes

    Endpoint Central | February 25, 2025

    Scattered Spider: Weaving an ever expanding web of cybercrimes

    Imagine you are the owner of a bustling casino casually observing the vibrant scene: The...

    Tech tales and endpoint hacks: Dive deep with Endpoint Pulse

    General | March 14, 2024

    Tech tales and endpoint hacks: Dive deep with Endpoint Pulse

    Remember the captivating stories you heard growing up? Though we may have graduated to...

    Look twice before you "LookBack"

    Endpoint Central | January 24, 2023

    Look twice before you "LookBack"

    What makes great art, whether it be in literature, painting, film, or photography, so...

    9 tips to master the art of software installation

    Endpoint Central | November 1, 2022

    9 tips to master the art of software installation

    IT admins face pressure from all sides. Besides tracking and securing data across devices...

    Why a software self-service portal is a must

    Endpoint Central | May 18, 2022

    Why a software self-service portal is a must

    Imagine you're in an airport and going through security. Why do you have to go through...

    Endpoint management: A must-have for the financial sector

    General | April 7, 2022

    Endpoint management: A must-have for the financial sector

    It's almost that time of the year to file taxes in Portugal, so John opens the email he...

    Are you ready for Windows 11?

    Endpoint Central | March 4, 2022

    Are you ready for Windows 11?

    Windows 11 is coming. Ever since its release in October 2021, users have been checking...

    Securing endpoints, part 1: Ensuring hackers don't manipulate your browsers to carry out attacks

    Endpoint Central | August 19, 2021

    Securing endpoints, part 1: Ensuring hackers don't manipulate your browsers to carry out attacks

    In a world of automation, computers and the data on them have become the backbone of many...