• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Endpoint Central / Blog

The yin and yang of AI in endpoint security: Your essential guide to modern endpoint protection

Endpoint Central | January 8, 2026

The yin and yang of AI in endpoint security: Your essential guide to modern endpoint protection

The ancient Chinese philosophy of yin and yang teaches us that within every force lies its...

Empower frontline healthcare workers with shared devices

Endpoint Central | November 24, 2025

Empower frontline healthcare workers with shared devices

Healthcare largely depends on shift‑based workers like nurses, speech therapists, and...

Device provisioning struggles due to M&As, high staff turnovers, and Epic go-lives

Endpoint Central | November 19, 2025

Device provisioning struggles due to M&As, high staff turnovers, and Epic go-lives

Two primary trends are reshaping the healthcare industry: First, healthcare experiences a...

Your IT stack is costing you millions: Four moves that delivered a 442% ROI

Endpoint Central | November 10, 2025

Your IT stack is costing you millions: Four moves that delivered a 442% ROI

If you lead an IT or security team, you know the reality: Your time is constantly stolen...

BYOD in healthcare | Articles - ManageEngine Endpoint Central

Endpoint Central | November 3, 2025

BYOD in healthcare | Articles - ManageEngine Endpoint Central

Healthcare organizations (HCOs) increasingly rely on BYOD to support...

HIPAA Security Rule updates: A proposed 15‑day patch mandate for critical vulnerabilities

Endpoint Central | October 31, 2025

HIPAA Security Rule updates: A proposed 15‑day patch mandate for critical vulnerabilities

Healthcare is facing a new urgency curve. Proposed updates to the HIPAA Security Rule for...

BYOD for privacy-conscious physicians | Articles - ManageEngine Endpoint Central

Endpoint Central | October 30, 2025

BYOD for privacy-conscious physicians | Articles - ManageEngine Endpoint Central

What's more convenient than having access to your work apps on your...

Why malware can't be stopped by antivirus solutions alone | Articles - ManageEngine Endpoint Central

Endpoint Central | October 17, 2025

Why malware can't be stopped by antivirus solutions alone | Articles - ManageEngine Endpoint Central

Even with today’s advanced antivirus solutions, which use virus...

Access Vectors and Endpoint Risks: An analysis based on 2025 Verizon DBIR | Articles - ManageEngine Endpoint Central

Endpoint Central | October 16, 2025

Access Vectors and Endpoint Risks: An analysis based on 2025 Verizon DBIR | Articles - ManageEngine Endpoint Central

British mathematician Clive Humby said that "Data is the new oil&quot...

Why traditional antivirus is dead weight (And what you should be using instead)

Endpoint Central | October 15, 2025

Why traditional antivirus is dead weight (And what you should be using instead)

Antivirus (AV) was built for a different era—when viruses were ...

QRSwapper analysis: Malware distributed via Google Colab

Endpoint Central | October 10, 2025

QRSwapper analysis: Malware distributed via Google Colab

Table of contentsOverviewDetailed malware analysisInitial...

Why traditional antivirus is dead weight (And what you should be using instead)

Endpoint Central | September 4, 2025

Why traditional antivirus is dead weight (And what you should be using instead)

Some malware no longer needs a file to cause damage. It can slip into...

Page 1 of 42123...»Last »