×

Valuable whitepapers, datasheets and webinars.

 
 

Adopting Least Privilege with Windows 7

As local administrators come under the security spotlight, many businesses have used the migration to Windows 7 as a catalyst to achieve a state of least privilege to improve their security defenses. The transition to Windows 7 isn't without its challenges however, even after the migration has taken…

Use Cases
Read More

Adopting Least Privilege with Windows 8

As organizations become aware of the heightened internal and external security risk caused by local administrator users, and the need to meet industry or governmental regulations becomes more commonplace, many businesses are using the migration away from Windows XP to Windows 8 as a catalyst to achi…

Use Cases
Read More

Least Privilege in the Data Center

More than 50% of IT security professionals say their sysadmins pose a moderate to high risk to their network according to research from McAfee. Removing excess administrator privileges is considered to be one of the most essential risk mitigation strategies for organizations and IT departments globa…

Use Cases
Read More

Complementing Vaulting Technologies in the Data Center

Many businesses, financial institutions and regulated authorities have implemented a Privileged Identity Management (PIM) solution to address security requirements for the monitoring of privileged user activity. These solutions are especially relevant for servers which are controlled by system admin…

Use Cases
Read More

PwC Switzerland Case Study

The 65-strong IT team at the PwC Switzerland branch currently manages 3,500 laptops, which over the years have run on a range of different Windows operating systems with administrator rights. With 60-70% of employees at PwC Switzerland working between different locations, PwC Switzerland was looking…

Case Studies
Read More

Overcoming Web Threats with Sandboxing

In today's digitalized workplace, employees expect and often demand full access to online content in order to do their jobs effectively. With the rising influence of Generation Y, an increasing number of employees expect to be able to access social media and other personal content at all times too. …

Articles
Read More

5 Good Reasons to Remove Admin Rights from your Sysadmins

The world of desktop security has experienced a revolution. Respected consultants such as Gartner have become increasingly vocal in their firm recommendation that organizations should minimize and often remove administrator rights. But server administrators (sysadmins) are surely a different kettle …

Articles
Read More

Guide to the Recommendations of the Australian DoD

The Australian Government's Defence Signals Directorate (DSD) also known as the Australian Signals Directorate (ASD) maintains a highly regarded strategy paper, providing advice to defend against cyber attacks. Informed by the DSDs experience in operational cyber security, this guide was one of the …

Articles
Read More

SANS Top 20 Critical Controls

The SANS Institute was established in 1989 as a cooperative research and education organization and is now the largest source for security training and certification in the world. Derived from the most common attack patterns and vetted across government and industry bodies, the SANS 20 Critical Cont…

Articles
Read More

The One Big Thing to Mitigate Cyber Attack

Advances in IT security are continuing to cause headaches for today's cyber criminals, yet as a new breed of increasingly savvy hackers emerge, exposure to a variety of threats remain a fact of life for most organizations across the globe. To combat this, CIOs and CISOs are looking for simple but hi…

Articles
Read More

How to Simply Achieve HIPAA Compliance

With the Final Rule under the HITECH Act increasing the maximum penalty for HIPAA non-compliance to $1.5 million as well as accelerating publicity around breaches through greater notification requirements, the need to strengthen security protections for personal health information (PHI) has never be…

Articles
Read More

2013 Microsoft Vulnerabilities Report

Microsoft bulletins are issued on the second Tuesday of each month, a date known commonly as "Patch Tuesday", and contain fixes for Microsoft critical vulnerabilities affecting Microsoft products that have been discovered since the last bulletin's release. Network Administrators, Security Managers a…

Reports
Read More

Privilege Management Datasheet

88% of insider attacks are caused by privilege abuse in today's businesses with notable data breaches in recent years facilitated by abuse of admin privileges. Privilege Management allows you to assign privileges to applications, not users, enabling you to remove admin rights and protect the operati…

Datasheets
Read More

Application Control Datasheet

Ensuring users are free to access and install the applications they need, without compromising security, is critical for business. The Council on Cyber Security lists application control as the most essential strategy for mitigating threats, based on real-world data. Solve the traditionally difficul…

Datasheets
Read More

Sandboxing Datasheet

With the internet now presenting the greatest window of opportunity for outside threats, vulnerabilities in web browsers and productivity software such as Adobe Reader and Microsoft Office, create opportunities for malicious code to enter your network. Defendpoint Sandboxing extends security coverag…

Datasheets
Read More

Avecto & SANS Critical Security Controls

The SANS Institute was established in 1989 as a cooperative research and education organization and is now the largest source for security training and certification in the world. Derived from the most common attack patterns and vetted across government and industry bodies, the 20 Critical Controls …

Datasheets
Read More

Achieving Regulatory Compliance

As greater emphasis is placed on complying with industry and government regulations, securing data as it passes through personal computer systems is crucial to satisfy auditors to protect systems against data loss and reputational damage. These include: Payment Card Industry Data Security Standard …

Whitepapers
Read More

Balancing security and user freedom

Does your IT security strategy work for your business or against it? Filmed at The Daily Telegraph offices in London, Andrew Avanessian, EVP of Consultancy and Technology Services at Avecto, shares his thoughts on how to get the right balance between security and user freedom. Andrew takes a closer…

Videos
Read More

Defendpoint fly-through video

Watch this short video to see the high level benefits of Defendpoint and its three complementary modules: Privilege Management, Application Control and Sandboxing. In less than three minutes you'll discover how this proactive endpoint security software helps you achieve defense in depth against unkn…

Videos
Read More

Admin Privileges - A Hidden Threat

Creating a safer business environment needn't be a complicated process. 96% of Microsoft OS vulnerabilities can be mitigated by removing admin rights alone. In this infographic we take a closer look at the hidden threat of administrator privileges and how combining privilege management, application …

Infographics
Read More

25 Years of Internet and Cyber Security Developments

With 600 million websites now in existence and 200,000 new threats appearing every minute according to McAfee, security professionals are under ever more pressure to try and secure the endpoint against an increasingly complex background. From the Morris worm to Heartbleed, this infographic depicts a…

Infographics
Read More

Avecto in Numbers

With offices in Manchester (UK), Boston (US) and Melbourne (AUS), Avecto is a truly global IT security specialist with customers far and wide - covering a huge range of industry sectors and countries across the globe. Avecto's award winning technology protects over 4 million endpoints and can be fou…

Infographics
Read More

The Digital Office Worker

Online browsing and the ability to have full access to online content is the cornerstone of any modern business. Social media is now recognized as the number one office activity for today's digital office worker with 67% using social media for personal reasons multiple times a day. As 90% of undetec…

Infographics
Read More

Overcoming Cyber Attacks

Over 200,000 cyber threats now appear on a daily basis, that's 3 a second, businesses therefore are forced to look much closer at how prepared they are to protect themselves from attack. The question is, are businesses today doing enough to succeed in the battle against cyber security threats and ar…

Infographics
Read More

Avecto support services

Avecto protects over 4 million endpoints in organizations all over the world. Our consultative approach delivers technical solutions to commercial challenges in a range of different industries; enabling global enterprises to strike just the right balance between defense in depth and user flexibility…

Infographics
Read More

Resource Type