• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:Endpoint management

5 building blocks for seamless endpoint security

Endpoint Central | December 6, 2017

5 building blocks for seamless endpoint security

Enterprise security has become a top priority with the recent spike in cyber attacks....

Why Desktop Central is the best SCCM alternative

Endpoint Central | December 2, 2017

Why Desktop Central is the best SCCM alternative

Managing endpoint devices is a tough job, especially without the right IT management...

FinFisher, malware infecting Adobe Flash, may be spying on your organization

Endpoint Central | November 3, 2017

FinFisher, malware infecting Adobe Flash, may be spying on your organization

Adobe Flash is under siege by malware called FinFisher. FinFisher exploits a zero-day...

How to protect yourself from the Microsoft Word DDE exploit

Endpoint Central | October 30, 2017

How to protect yourself from the Microsoft Word DDE exploit

Amid the avalanche of cyber threats 2017 has already seen, a new attack has emerged...

Keeping your end users safe from the latest Facebook phishing attack

Endpoint Central | October 24, 2017

Keeping your end users safe from the latest Facebook phishing attack

After the WannaCry and Petya attacks earlier this year, ransomware and malware attacks...

What companies should know about the Kaspersky breach

Endpoint Central | October 20, 2017

What companies should know about the Kaspersky breach

While enterprises around the world are preparing themselves for external hacking attempts...

Free e-book: Six best practices for escaping ransomware

Endpoint Central | October 13, 2017

Free e-book: Six best practices for escaping ransomware

Breaking news about cyber attacks has reached an all-time high recently, with ransomware...

Defeat IT security threats at our NYC User Conference

General | August 2, 2017

Defeat IT security threats at our NYC User Conference

For the IT world, summer vacation has been cut short this year due to recent ransomware...

Forget prolonged text chats. Improve SLA resolution times with enhanced troubleshooting tools 

Endpoint Central | July 21, 2017

Forget prolonged text chats. Improve SLA resolution times with enhanced troubleshooting tools 

Digital communication has seen some major developments in the last few years. Moving from...

Fireball—the zombie apocalypse for internet browsers

Endpoint Central | July 14, 2017

Fireball—the zombie apocalypse for internet browsers

If a zombie apocalypse looks like hordes of the undead eating human flesh, a browser...

ServiceNow+Desktop Central: Integration that delivers better IT services

Unified endpoint management and security | July 11, 2017

ServiceNow+Desktop Central: Integration that delivers better IT services

Just imagine how efficient your ServiceNow help desk would be if it could do more than...

WannaCry: Battle with the shadow

Endpoint Central | July 5, 2017

WannaCry: Battle with the shadow

"There are two kinds of people in America today: those who have experienced a foreign...

Page 2 of 3«123»Last »