×

Valuable whitepapers, datasheets and webinars.

 
 

Least Privilege in the Data Center

Removing excess administrator privileges is considered to be one of the most essential risk mitigation strategies for organizations and IT departments globally; immediately improving the security posture of any organization and enabling regulatory compliance. This approach of 'least privilege', whe…

Use Cases
Read More

Complementing Vaulting Technologies in the Data Center

Many businesses, financial institutions and regulated authorities have implemented a Privileged Identity Management (PIM) solution to address security requirements for the monitoring of privileged user activity. These solutions are especially relevant for servers which are controlled by IT / system …

Use Cases
Read More

PwC Switzerland Case Study

The 65-strong IT team at the PwC Switzerland branch currently manages 3,500 laptops, which over the years have run on a range of different Windows operating systems with administrator rights. With 60-70% of employees at PwC Switzerland working between different locations, PwC Switzerland was lookin…

Case Studies
Read More

Overcoming Web Threats with Sandboxing

Today's technologically enabled workers expect full access to online content in order to do their jobs effectively. With the rising influence of Generation Y employees (35% of UK workers are now reported to be millennials), an increasing number of employees expect to be able to access social media a…

Articles
Read More

5 Good Reasons to Remove Admin Rights from your Sysadmins

The world of desktop security has experienced a revolution. Respected consultants such as Gartner have become increasingly vocal in their firm recommendation that organizations should minimize the use of administrative rights. This article covers the five top reasons why running server administrato…

Articles
Read More

Guide to the Recommendations of the Australian DoD

The Australian Government’s Defence Signals Directorate (DSD) also known as the Australian Signals Directorate (ASD) maintains a highly regarded strategy paper, providing advice to defend against cyber attacks. In this short guide, we review the top four mitigation strategies identified by th…

Articles
Read More

SANS Top 20 Critical Controls

The SANS Institute was established in 1989 as a cooperative research and education organization and is now the largest source for security training and certification in the world. This short guide looks at the "First Five Quick Wins" identified by SANS for overcoming the latest Advanced Targeted Th…

Articles
Read More

The One Big Thing to Mitigate Cyber Attack

Advances in IT security are continuing to cause headaches for today's cyber criminals, yet as a new breed of increasingly savvy hackers emerge, exposure to a variety of threats remains a fact of life for most organizations across the globe. This article reveals the One Big Thing you can do today, t…

Articles
Read More

2013 Microsoft Vulnerabilities Report

Microsoft bulletins are issued on the second Tuesday of each month, a date known commonly as "Patch Tuesday", and contain fixes for vulnerabilities affecting Microsoft products that have been discovered since the last bulletin's release. Network Administrators, Security Managers and IT Professionals…

Reports
Read More

Avecto & SANS Critical Security Controls

The SANS 20 Critical Security Controls for Effective Cyber Defense prioritizes a list of measures that are effective in combating real-world threats. Derived from the most common attack patterns and vetted across government and industry bodies, the 20 Critical Controls focus on a small number of act…

Datasheets
Read More

Achieving Regulatory Compliance

As greater emphasis is placed on complying with industry and government regulations, securing data as it passes through personal computer systems is crucial to satisfy auditors to protect systems against data loss and reputational damage. Organizations can yield quick gains by implementing simple s…

Whitepapers
Read More

25 Years of Internet and Cyber Security Developments

From the Morris worm to Heartbleed, this infographic depicts a short history of internet milestones and cyber security developments spanning over 25 years, while integrating the views of over 500 security professionals surveyed at InfoSec 2014.

Infographics
Read More

Avecto in Numbers

Avecto customers span far and wide - covering a huge range of industry sectors and countries across the globe. This infographic provides a snapshot of our expertise, showing your solution is in safe hands – from the World's largest banks to major aerospace leaders and beyond.

Infographics
Read More

The Digital Office Worker

Online browsing and the use of productivity software is crucial in the day-to-day running of modern enterprises. Balancing security and user freedoms is the key to ensuring employees remain creative, productive and profitable This infographic shows the key trends affecting business and how security…

Infographics
Read More

Overcoming Cyber Attacks

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective? In this infographic, we look at the key cyber challenges faced by today's businesses, along with the major data breaches of 2013/14 and the ef…

Infographics
Read More

Resource Type