aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days

Resources

Microsoft Vulnerabilities Report 2016

For the fourth consecutive year, we've analyzed the findings of the known vulnerabilities published by Microsoft.

The 2016 report takes an in-depth look at the vulnerabilities affecting Windows, Office, browsers Windows Server and more - highlighting the clear case for admin rights removal in the enterprise as part of a proactive approach to endpoint security.

Download the report

Filters

Filter By Type

Filter By Category

Datasheets

Application control datasheet

Defendpoint application control solves the traditionally difficult challenge of managing business applications. Download this application control data…

Datasheets

Privilege management datasheet

Privilege management assigns privileges to individual applications, tasks and scripts, never to users. Download this privilege management datasheet to…

Datasheets

The CIS Critical Security Controls

Introduced in 2008 in response to extreme data losses in the US, the 20 Critical Security Controls prioritizes a list of measures that are effective i…

Datasheets

McAfee + Avecto solutions brief

Discover how Defendpoint integrates with McAfee ePO to provide security strength and depth, offering robust protection against advance threats on the …

Datasheets

Defendpoint iC3 datasheet

Find out more about our Intelligent Communication, Coordination and Control (iC3) cloud-based platform for Defendpoint with our datasheet.

Datasheets

Defendpoint Insights datasheet

Get more out of your security deployment through Defendpoint Insights. Providing insight and intelligence you can discover, manage and monitor activit…

Datasheets

Defendpoint deployment and management options

When it comes to deploying Defendpoint you have a choice of three management platforms - Group Policy edition, ePO edition and iC3 edition. The same a…

Datasheets

Defendpoint ePO datasheet

Read our datasheet to find out more about the benefits of choosing Defendpoint ePO edition, including how it offers single console visibility alongsid…

Datasheets

Defendpoint for Mac datasheet

Download the Defendpoint for Mac data sheet for the technical benefits of this innovative least privilege solution.