aidarrow-end-inversearrow-endarrow-left-angulararrow-left-angularWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareArticleUse caseWebinarResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days

iC3 Edition

While the Defendpoint agent provides the same rich capabilities and policy format regardless of Avecto management platform, your choice of iC3 deployment – on-prem or in the Cloud – gives you the ultimate in intelligent communication, coordination, and control. Manage the removal of admin rights, achieve least privilege and pro-actively manage endpoint security.

Technical benefits of Defendpoint iC3

Defendpoint iC3 edition features fast, scalable endpoint privilege management of Defendpoint for Windows, and macOS hosted on-premise or in the cloud.

  • Flexible: On prem or cloud deployment options

    Leverage iC3 either on-premise or in the cloud. Whether you are delivering Windows privilege management rollouts through a traditional on-premise approach or adopting Microsoft’s cloud-based Windows modern management approach, Defendpoint is flexible enough to support your privilege management needs.

  • Scalable: seamlessly grows as business grows

    Manage hundreds of thousands of computers and servers with ease. As your organization grows, iC3 grows with you: easily add additional servers and computers and leverage a powerful REST-based API to easily automate manual tasks and configure business rules.

  • Always connected: protecting remote users is easier than ever

    iC3 is always connected to the Defendpoint client to receive event data and distribute policy updates. So even if your users are connecting from outside the corporate network, their activity can be audited and their machines can receive policy updates regardless of location.

  • Modern interface: searching and filtering yields quick results

    Searching and filtering in iC3 returns instant results, making it easy to manage large amounts of data. Search across users, computers, groups, and policies to find information quickly and filter displayed data to drill into what’s most important to you.

Why Defendpoint?

Defendpoint protects against the biggest area of attack, protecting corporate IP by removing local admin rights and the most dangerous sysadmin privileges. We advocate the removal of admin rights from all users, before layering on your PASM vaulting technology.

Compliance mandates aren’t always easy to meet. We’ll help you get on track.

Defendpoint meets least privilege and identity access management guidelines by removing user / admin privileges and whitelisting trusted applications across all endpoints - even in the data center - while trend reporting and analysis demonstrates compliance with GDPR, SOX, PCI, DSS, NIST, HIPPA and many more.

Learn more about meeting compliance

Don't leave cyber security to chance

Deter insider attacks by giving access to only to the applications, tasks, and scripts users need. And prevent external attacks that rely on trusted applications and elevated privileges to execute malware and move laterally across your network.

Free your users from security barricades

The turn-key Quick Start policy makes automated privilege access achievable overnight. Users operate from the safety of standard user accounts while enjoying the flexibility of admin accounts - all without IT frustration. The single lightweight agent makes deployment and maintenance simple.

Ready to learn more?

Eliminating privileges is one of the most essential risk mitigation strategies for any organization. Learn what makes Avecto a leader Privileged Elevation and Delegation Management and how Defendpoint helps organizations achieve secure and compliant endpoints.