While the Defendpoint agent provides the same rich capabilities and policy format regardless of Avecto management platform, your choice of iC3 deployment – on-prem or in the Cloud – gives you the ultimate in intelligent communication, coordination, and control. Manage the removal of admin rights, achieve least privilege and pro-actively manage endpoint security.
Flexible: On prem or cloud deployment options
Leverage iC3 either on-premise or in the cloud. Whether you are delivering Windows privilege management rollouts through a traditional on-premise approach or adopting Microsoft’s cloud-based Windows modern management approach, Defendpoint is flexible enough to support your privilege management needs.
Scalable: seamlessly grows as business grows
Manage hundreds of thousands of computers and servers with ease. As your organization grows, iC3 grows with you: easily add additional servers and computers and leverage a powerful REST-based API to easily automate manual tasks and configure business rules.
Always connected: protecting remote users is easier than ever
iC3 is always connected to the Defendpoint client to receive event data and distribute policy updates. So even if your users are connecting from outside the corporate network, their activity can be audited and their machines can receive policy updates regardless of location.
Modern interface: searching and filtering yields quick results
Searching and filtering in iC3 returns instant results, making it easy to manage large amounts of data. Search across users, computers, groups, and policies to find information quickly and filter displayed data to drill into what’s most important to you.
Quick Start: least privilege in hours, not months
Unlike traditional privilege management products that can take months to properly configure, Defendpoint's unique Quick Start policy gets you up and running in mere hours. No other product can offer this level of convenience, flexibility, and speed during deployment.Read the data sheet
Trusted Application Protection: keep safe apps secure
Defendpoint with Trusted Application Protection (TAP) proactively defends against script-based and file-less attacks hidden inside trusted programs such as Word, PowerPoint, Excel and common web browsers.Read the data sheet
Microsoft vulnerabilities: how to protect your business
The Microsoft Vulnerabilities Report reviews the latest trends and reveals that the number of published vulnerabilities has risen by quite a bit over five years. Leading security experts weigh in on the results and provide their own analysis of how to deal with this increase.Download the report
Seyfarth Shaw LLP is an international law firm with offices in 14 cities across the globe. With a team of more than 2,000 (including 900 attorneys), they are recognized as one of America's leading and most innovative law firms. In this case study, we look at how the rollout of Defendpoint across Seyfarth Shaw tied in with the firm’s migration to Windows 10, assisting them to achieve the following:
- Greatly reduce their number of users with admin rights
- Assist in achieving compliance and security requirements
- Achieve all of this efficiently by using our Quick Start configuration
Compliance mandates aren’t always easy to meet. We’ll help you get on track.
Defendpoint meets least privilege and identity access management guidelines by removing user / admin privileges and whitelisting trusted applications across all endpoints - even in the data center - while trend reporting and analysis demonstrates compliance with GDPR, SOX, PCI, DSS, NIST, HIPPA and many more.
Don't leave cyber security to chance
Deter insider attacks by giving access to only to the applications, tasks, and scripts users need. And prevent external attacks that rely on trusted applications and elevated privileges to execute malware and move laterally across your network.
Free your users from security barricades
The turn-key Quick Start policy makes automated privilege access achievable overnight. Users operate from the safety of standard user accounts while enjoying the flexibility of admin accounts - all without IT frustration. The single lightweight agent makes deployment and maintenance simple.
Ready to learn more?
Eliminating privileges is one of the most essential risk mitigation strategies for any organization. Learn what makes Avecto a leader Privileged Elevation and Delegation Management and how Defendpoint helps organizations achieve secure and compliant endpoints.
Defendpoint iC3 datasheet
Find out more about our Intelligent Communication, Coordination and Control (iC3) cloud-based platform for Defendpoint with our datasheet.
Defendpoint deployment and management options
When it comes to deploying Defendpoint you have a choice of three management platforms - Group Policy edition, ePO edition and iC3 edition. The same a…