×

Valuable whitepapers, datasheets and webinars.

 
 

How to successfully balance IT security and user privacy rights

In this paper we've put the focus on activity logging, helping you get the right balance between user privacy rights and IT security. Defendpoint offers a solution to this potentially problematic situation, allowing you to combat threats, while also complying with legislation such as German data pri…

Articles
Read More

Defendpoint ePO Edition Datasheet

Defendpoint ePO edition is just one of our management platforms, and is an ideal choice for enterprises wanting to make use of their existing McAfee ePolicy Orchestrator infrastructure. Read our datasheet to find out more about the benefits of choosing Defendpoint ePO edition, including how it offer…

Datasheets
Read More

SICK AG Case Study

Find out more about how choosing Defendpoint allowed SICK AG to move away from an environment where a large share of its employees had full admin rights in this case study. Discover why it chose Defendpoint, how it rolled out the software and how it’s benefited the business.

Case Studies
Read More

Defendpoint deployment and management options

When it comes to deploying Defendpoint you have a choice of three management platforms - Group Policy edition, ePO edition and iC3 edition. The same agent and policy format is used across each, but your organization might be better suited to a particular option. Read on for an overview of what each …

Datasheets
Read More

Motivations of a Mac hacker

It's only a matter of time before Macs become susceptible to the same attacks as Windows, with hackers giving an increasing focus to the platform. In the wake of XCode Ghost and KeRanger ransomware targeting OS X specifically, Mac security guru Patrick Wardle shares his views on what's next for Mac …

Videos
Read More

State of Mac Security 2016: Enterprise Mac management

Apple is taking bigger bites out of Windows' market share as the OS X ecosystem becomes an increasingly popular business choice. More Macs are showing up in the boardroom and key corporate positions as premium devices, with the number of associated threats also on the up. Read on for a pulse check o…

Reports
Read More

Challenges of enterprise Mac management

Macs are an increasingly popular choice in many organizations, and the number of cyber threats targeted at OS X are on the up too. So, it’s a great time to ask if your enterprise has a strategy in place for managing them. In this short article we’ll help you understand the security state…

Articles
Read More

Why a proactive approach to cyber security pays dividends

There's plenty of evidence out there to suggest that in isolation a reactive approach to security is likely to end in failure. Instead, the best and most cost effective way of tackling cyber threats is head on, with a strategy built on proactive security. In this in-depth whitepaper we take a look a…

Reports
Read More

Containing the outbreak: The healthcare security pandemic

In this lively webinar Avecto Senior Security Engineer James Maude offers advice to help you avoid becoming a victim of ransomware attack. He shares a breakdown of Locky ransomware, offers key learnings to takeaway and demonstrates how Defendpoint can proactively immunize endpoints against the lates…

Videos
Read More

A hacker's guide to ransomware

Join world-renowned independent security expert Paula Januszkiewicz for a hacker's guide to ransomware. In this on-webinar you'll learn about code execution threats and how ransomware is introduced and works. You'll also be armed with an understanding of what you can do to prevent it.

Videos
Read More

Why proactivity pays

With new cyber threats emerging every minute of the day, network-based security solutions alone are unlikely to give your organization the protection it needs. Instead, it's better to take a proactive approach, starting at the endpoint and building out. In this infographic we show why reactive solut…

Infographics
Read More

City of Greater Sudbury Case Study

With close to 2,000 end users with local admin rights, the municipality of Greater Sudbury realised it needed to better manage privileges across the organization. As the organization sought to migrate from Windows XP to Windows 7 it saw this as the perfect opportunity to improve its security posture…

Case Studies
Read More

iC3 Datasheet

Find out more about our Intelligent Communication, Coordination and Control (iC3) cloud-based platform for Defendpoint with our datasheet. Managed through Microsoft Azure, it sits alongside our Group Policy and ePO editions, giving you a new Defendpoint management platform choice.

Datasheets
Read More

Guide to the NIST Cybersecurity Framework

The National Institute of Standards and Technology (NIST) Cybersecurity Framework was created on a White House directive in 2013. This voluntary code encourages organizations to evaluate their risk position and implement the appropriate levels of control. In this paper we take a closer look at the F…

Whitepapers
Read More

Guide to meeting requirements of USGCB

The United States Government Configuration Baseline (USGCB) is a mandate for Windows and Redhat Linux PCs and differs from most industry regulations in that it clearly defines more than 700 settings and how they must be configured. In this paper we cover how it differs from its predecessor FDCC, adv…

Whitepapers
Read More

Guide to meeting requirements of MAS

In this whitepaper we take a closer look at the Monetary Authority of Singapore's Technology Risk Management document and how you can comply with it. This is an update on the previously released Internet Banking Technology Risk Management (IBTRM) guidelines and will apply to all financial institutio…

Whitepapers
Read More

CPNI Critical Security Controls for effective cyber defense

Organizations can no longer afford to rely solely on reactive security technologies, such as antivirus and endpoint firewalls. In this whitepaper we cover the internationally recognised baseline standard of information security best practices developed by the Centre for Internet Security with input …

Whitepapers
Read More

How to Simply Achieve Sarbanes-Oxley (SOX) Compliance

Sarbanes-Oxley (SOX) was passed into US law in 2002 and requires public companies to verify the accuracy of their financial information. Specifically, SOX section 404 states that organizations must demonstrate confidence in IT systems that store, transport and process data. In this article, Microsof…

Articles
Read More

How to Simply Achieve PSN Compliance

The UK government Public Services Network (PSN) Code of Practice is a set of requirements aimed at government departments. In this paper we take a closer look at the code, which replaced the Government Secure Intranet Code of Connection in November 2012, and outline how Avecto Defendpoint can help t…

Articles
Read More

A unique approach to application whitelisting

New cyber threats are emerging every minute and whitelisting is a defense strategy proven to reduce the risks of becoming the latest victim. But, traditional whitelisting doesn't come without its challenges. In this infographic we outline some of the usual pros and cons, and reveal how Avecto's appr…

Infographics
Read More

Endpoint vs network security - where to start?

With 327 new threats every minute, and more than five every second, we’ve put the focus on network and endpoint approaches, comparing the pros and cons of each to help you start prioritizing your security. Read on to learn more about how you can stay a step ahead of evolving and increasing att…

Articles
Read More

Defendpoint: Real-world healthcare breach analysis

Hospitals across the globe have been thrown into a state of high alert following a series of high profile ransomware outbreaks. Unlike the human viral threats they are equipped to deal with, these outbreaks are proving far more difficult to contain and treat, putting data and patient safety at risk.…

Articles
Read More

Managing Privileges: PIM vs PM

Removing excess administrator privileges is widely considered to be an immediate way for organizations to improve security and make compliance with the latest legislation easier to achieve. Indeed, 85% of Microsoft vulnerabilities in 2015 were mitigated by the removal of admin rights. Here we take a…

Articles
Read More

CEB Case Study

Successfully managing admin rights over 4,000 endpoints in multiple locations was becoming an increasingly difficult and arduous process for CEB. With a large number of helpdesk enquiries coming through from users requiring admin access, they recognized the need to take control of admin rights acros…

Case Studies
Read More

EU GDPR guide to protecting PII

With strict penalties for non-compliance, data protection is an issue that cannot be ignored. In this guide, we take a look at the role Privilege Management, Application Control and Sandboxing can play helping to achieve compliance with EU General Data Protection Regulation (GDPR). The legislation i…

Whitepapers
Read More

Complying with the Defence Cyber Protection Partnership

The growing risk of threats from malicious actors, such as foreign intelligence services and terrorists, has led to the Ministry of Defence improving the protection of the defence supply chain with the release of the Defence Cyber Protection Partnership's (DCPP) Cyber Security Model (CSM). Here, we …

Whitepapers
Read More

Customer journey brochure

Take a look at our customer journey brochure to learn how our best practice approach and highly-skilled consultants will help make your project a success from the start. Our five-step process begins with identifying your requirements and takes you all the way through to Defendpoint implementation, p…

Datasheets
Read More

Know your enemy; choose your weapons wisely

This year, cyber attacks will once again become more stealthy and more pervasive. For most organizations, cyber perils now loom as a source of imminent, catastrophic harm much more so than fire, flood or earthquake. And yet far too many organizations are only just waking up to the need to achieve a …

Videos
Read More

Least is the new less privilege

In this thought provoking article, Microsoft security expert, Russell Smith examines the limitations of Windows User Account Control and why least is the new less when it comes to user privileges.

Articles
Read More

The hacker’s perspective: The hunt for admin rights

Microsoft MVP and ethical hacker Sami Laiho is a renowned speaker with a passion for Windows security. Sharing the motivations of a hacker, Sami exposes how and why admin rights are so often sought by attackers and insiders as the way in to stealing IP and data. He also offers his own perspective on…

Videos
Read More

2015 Microsoft Vulnerabilities Report

For the third consecutive year, Avecto has analyzed the findings of the known vulnerabilities published by Microsoft. The report compares the annual trends and reveals a 52% uplift in the number of reported vulnerabilities. The 2015 report takes an in-depth look at the vulnerabilities affecting Inte…

Reports
Read More

How does proactive security pay?

Join security journalist and blogger Dan Raywood on this live webinar to find out what happens when security goes wrong and how to avoid falling into the same traps. 3 reasons to watch the webinar: Discover why security should be on the board meeting agenda and how to raise the priority Learn why a…

Videos
Read More

2016 Security Predictions

What lessons can we learn from 2015 when it comes to IT security? And what's in store for 2016? We share views from nearly 250 infosec professionals and reveal that: 73% believe that security is more important than user freedom 63% say that IT security is a key concern of CEO / leadership teams 22%…

Infographics
Read More

Building the Business Case for Proactive Security

This paper takes a closer look at the commercial impact of IT security and how to build a compelling business case for a proactive approach that ensures security, productivity and ultimately a return on investment. Download this commercial whitepaper to learn: The true cost of a data breach, based …

Reports
Read More

Why are Macs a hacker's dream?

As Macs become an increasingly popular choice for organizations, is the business community taking the risks they pose seriously? Mac security expert, Patrick Wardle, leads this engaging webinar and shines a light on whether Macs really are a hackers dream. Patrick is joined by Senior Technology Cons…

Videos
Read More

Whitelisting: Is it a silver bullet?

Following the recommendation from the Australian DoD that application whitelisting is the number one strategy for cyber threat mitigation, Avecto VP, Andrew Avanessian examines why whitelisting in isolation is not the only answer in today's threat landscape. 3 reasons to watch the webinar: Understa…

Videos
Read More

UK Government Cyber Essentials Scheme

Businesses are at greater risk than ever before from cyber-attacks, but a lack of resources, expertise and awareness has left SMEs vulnerable. Recognising the potential losses that a security breach can involve for SMEs, the UK government has launched a cut-down version of its 10 Steps to Cyber Secu…

Whitepapers
Read More

Snapshot of Mac Security 2015

Apple's foothold on the enterprise market is currently estimated to be worth around $25 billion annually according to CEO, Tim Cook - a figure which is steadily growing. You almost certainly have Macs in your business, connecting to your network and downloading files on a daily basis, but just how s…

Infographics
Read More

Defendpoint for Mac

With Defendpoint for Mac, users are able to run admin tasks and privileged applications without the need for an admin account. You regain control of apps with pragmatic whitelisting, ensuring that only known good applications are able to run, while users have the freedom and flexibility to perform e…

Datasheets
Read More

Mac security myths

While OS X was once more secure than Windows, advancements in security have seen Microsoft eclipse Apple, with Macs now presenting a soft target for hackers. This infographic will highlight the challenges with securing Macs in the enterprise, revealing that: 96% businesses now support Mac 66% have …

Infographics
Read More

Security Secrets - Does Windows 10 Change the Game?

You are investigating Windows 10 (or 8.1) in the hope of achieving nirvana with both improved security and user experience. The ability to improve security and run on the latest OS makes you smile. All problems are gone, right? Think again! Learn what's new in Windows 10 and 8.1 and learn from someo…

Videos
Read More

The time is now. Migrating from XP to Windows 7/8

In a recent poll, it was estimated that some 250 million people are still actively using Windows XP, with a significant proportion of these in an enterprise setting. Microsoft support for Windows XP ended on 8 April 2014 – over 13 years after the product launched in 2001, revealing just how vu…

Infographics
Read More

Don’t give in to user privilege demands in Windows 7

In this article, Windows security expert, Russell Smith discusses migration to Windows 7/8 and the various challenges of implementing a least privilege environment which ensures productivity without compromising on security.

Articles
Read More

7 ways to crack Windows 7

In this informative bite size article, Microsoft MVP Sami Laiho examines and explains seven different vulnerabilities in Windows 7 demonstrating why the removal of admin rights is essential to optimizing enterprise security. By simply manipulating Microsoft’s own misconfigurations or flaws to …

Articles
Read More

5 ways to optimize your endpoint protection strategy with Avecto & McAfee

Gone are the days where desktop security was limited to just antivirus software.  Faced with combatting today’s advanced threats – including targeted, zero-day attacks, phishing, drive by downloads and advanced persistent threats – endpoint protection suites that bolster secur…

Articles
Read More

Admins Under Attack - Why Least is the New Less

With attackers now seeking out local administrators to gain access to the operating system, even a small number of admin accounts can open the door to a host of vulnerabilities. In this webinar, Windows security expert, Russell Smith presents 5 reasons why you can't ignore admin rights - even when r…

Videos
Read More

McAfee Solutions Brief

Integrating with McAfee ePolicy Orchestrator software, Defendpoint offers simple infrastructure management with detailed reports providing actionable intelligence. With a unique approach that complements McAfee Endpoint Protection solutions, Defendpoint adds Privilege Management and Sandboxing capab…

Datasheets
Read More

eBook Chapter 2: The Hidden Flaws in Windows

In the second chapter of our C-level guide to defense in depth, ethical hacker and Microsoft MVP Sami Laiho examines the Windows platform and explores the hidden flaws in Windows that make proactive security solutions the only way forward for 2015 and beyond. Download chapter 2 of this eBook and dis…

Reports
Read More

Windows Server 2003 expiration brings defense in depth to life

Microsoft's support programme for Windows Server 2003 (WS2003) ends on 14 July 2015. After that date, if a new security vulnerability is discovered, there is no commitment that a fix will be produced and released by Microsoft, nor will it address non-security defects or assist customers that encount…

Articles
Read More

Security Snapshot: 2015's Threats

There are 387 new threats discovered every minute according to latest figures from McAfee. With 60% of CEOs worried that cyber threats will impact growth, 85% agree that cyber risk is a very real threat. In this infographic, we present more detail on the very latest research into 2015's cyber securi…

Infographics
Read More

Hear from a Hacker: The Hidden Flaws in Windows

Join Microsoft MVP Sami Laiho as he demonstrates how today's hackers can take advantage of the flaws in Windows technologies to breach your organization's data and systems. On this on-demand webinar, Sami will show how you can build on native tools like UAC, Applocker and NTFS security to eliminate …

Videos
Read More

eBook Chapter 1: Your Relationship with Risk

In this first chapter of our C-level guide to defense in depth, Windows security expert Russell Smith takes a closer look at the relationship we have with risk and why the concept of defense in depth is the most effective approach to combat today's advanced threats. Download chapter 1 of this inform…

Reports
Read More

Defendpoint Brochure

Defendpoint is Avecto's revolutionary endpoint security software that unites IT and end users. With traditional antivirus only effective half of the time, Defendpoint puts you a step ahead. Uniquely combining three proactive endpoint technologies in one integrated suite, Defendpoint protects your bu…

Datasheets
Read More

Cyber Threats Report 2015

With McAfee now reporting 387 new threats being discovered every minute, the digital security battle continues to rage on. In the rapidly evolving world of cyber security, attackers are continuously evolving their methods, launching new waves of malware to exploit weaknesses and infect systems. This…

Reports
Read More

Defending against advanced targeted threats with the SANS Critical Controls

As advanced targeted threats continue to grow in number and sophistication, is your organization prioritizing security initiatives that will stand up to future cyber attacks? In this on-demand webinar led by the SANS Institute, you will learn how combining privilege management, application control a…

Videos
Read More

2014 Microsoft Vulnerabilities Report

Now in its second year, the Microsoft Vulnerabilities Report analyses data from Patch Tuesday Security Bulletins issued by Microsoft throughout 2014. Typically issued on the second Tuesday of each month, Patch Tuesday Bulletins contain fixes for Microsoft critical vulnerabilities. Using this data, A…

Reports
Read More

Enterprise Reporting Datasheet

Get more out of your security deployment through Defendpoint Enterprise Reporting. Providing insight and intelligence you can discover, manage and monitor Privilege Management, Application Control and Sandboxing activity across the entire enterprise. Defendpoint Enterprise Reporting: Gain real-time…

Datasheets
Read More

10 Steps to Cyber Security

The Communications-Electronics Security Group (CESG), the information security arm of the UK GCHQ has issued a guide for UK businesses covering 10 critical areas of cyber security management. The CESG's 10 step guide provides a foundation for effective risk management, a framework to improve an orga…

Articles
Read More

Avecto support services

Avecto protects over 4 million endpoints in organizations all over the world. Our consultative approach delivers technical solutions to commercial challenges in a range of different industries; enabling global enterprises to strike just the right balance between defense in depth and user flexibility…

Infographics
Read More

How to Simply Achieve HIPAA Compliance

With the Final Rule under the HITECH Act increasing the maximum penalty for HIPAA non-compliance to $1.5 million as well as accelerating publicity around breaches through greater notification requirements, the need to strengthen security protections for personal health information (PHI) has never be…

Articles
Read More

Adopting Least Privilege with Windows 8

As organizations become aware of the heightened internal and external security risk caused by local administrator users, and the need to meet industry or governmental regulations becomes more commonplace, many businesses are using the migration away from Windows XP to Windows 8 as a catalyst to achi…

Use Cases
Read More

Adopting Least Privilege with Windows 7

As local administrators come under the security spotlight, many businesses have used the migration to Windows 7 as a catalyst to achieve a state of least privilege to improve their security defenses. The transition to Windows 7 isn't without its challenges however, even after the migration has taken…

Use Cases
Read More

Defendpoint fly-through video

Watch this short video to see the high level benefits of Defendpoint and its three complementary modules: Privilege Management, Application Control and Sandboxing. In less than three minutes you'll discover how this proactive endpoint security software helps you achieve defense in depth against unkn…

Videos
Read More

Balancing security and user freedom

Does your IT security strategy work for your business or against it? Filmed at The Daily Telegraph offices in London, Andrew Avanessian, EVP of Consultancy and Technology Services at Avecto, shares his thoughts on how to get the right balance between security and user freedom. Andrew takes a closer …

Videos
Read More

Admin Privileges - A Hidden Threat

Creating a safer business environment needn't be a complicated process. 96% of Microsoft OS vulnerabilities can be mitigated by removing admin rights alone. In this infographic we take a closer look at the hidden threat of administrator privileges and how combining privilege management, application …

Infographics
Read More

Sandboxing Datasheet

With the internet now presenting the greatest window of opportunity for outside threats, vulnerabilities in web browsers and productivity software such as Adobe Reader and Microsoft Office, create opportunities for malicious code to enter your network. Defendpoint Sandboxing extends security coverag…

Datasheets
Read More

Application Control Datasheet

Ensuring users are free to access and install the applications they need, without compromising security, is critical for business. The Council on Cyber Security lists application control as the most essential strategy for mitigating threats, based on real-world data. Solve the traditionally difficul…

Datasheets
Read More

Privilege Management Datasheet

88% of insider attacks are caused by privilege abuse in today's businesses with notable data breaches in recent years facilitated by abuse of admin privileges. Privilege Management allows you to assign privileges to applications, not users, enabling you to remove admin rights and protect the operati…

Datasheets
Read More

Complementing Vaulting Technologies in the Data Center

Many businesses, financial institutions and regulated authorities have implemented a Privileged Identity Management (PIM) solution to address security requirements for the monitoring of privileged user activity. These solutions are especially relevant for servers which are controlled by system admin…

Use Cases
Read More

Overcoming Cyber Attacks

Over 200,000 cyber threats now appear on a daily basis, that's 3 a second, businesses therefore are forced to look much closer at how prepared they are to protect themselves from attack. The question is, are businesses today doing enough to succeed in the battle against cyber security threats and ar…

Infographics
Read More

2013 Microsoft Vulnerabilities Report

Microsoft bulletins are issued on the second Tuesday of each month, a date known commonly as "Patch Tuesday", and contain fixes for Microsoft critical vulnerabilities affecting Microsoft products that have been discovered since the last bulletin's release. Network Administrators, Security Managers a…

Reports
Read More

The One Big Thing to Mitigate Cyber Attack

Advances in IT security are continuing to cause headaches for today's cyber criminals, yet as a new breed of increasingly savvy hackers emerge, exposure to a variety of threats remain a fact of life for most organizations across the globe. To combat this, CIOs and CISOs are looking for simple but hi…

Articles
Read More

SANS Top 20 Critical Controls

The SANS Institute was established in 1989 as a cooperative research and education organization and is now the largest source for security training and certification in the world. Derived from the most common attack patterns and vetted across government and industry bodies, the SANS 20 Critical Cont…

Articles
Read More

The Digital Office Worker

Online browsing and the ability to have full access to online content is the cornerstone of any modern business. Social media is now recognized as the number one office activity for today's digital office worker with 67% using social media for personal reasons multiple times a day. As 90% of undetec…

Infographics
Read More

Guide to the Recommendations of the Australian DoD

The Australian Government's Defence Signals Directorate (DSD) also known as the Australian Signals Directorate (ASD) maintains a highly regarded strategy paper, providing advice to defend against cyber attacks. Informed by the DSDs experience in operational cyber security, this guide was one of the …

Articles
Read More

Overcoming Web Threats with Sandboxing

In today's digitalized workplace, employees expect and often demand full access to online content in order to do their jobs effectively. With the rising influence of Generation Y, an increasing number of employees expect to be able to access social media and other personal content at all times too. …

Articles
Read More

Avecto in Numbers

With offices in Manchester (UK), Boston (US) and Melbourne (AUS), Avecto is a truly global IT security specialist with customers far and wide - covering a huge range of industry sectors and countries across the globe. Avecto's award winning technology protects over 4 million endpoints and can be fou…

Infographics
Read More

5 Good Reasons to Remove Admin Rights from your Sysadmins

The world of desktop security has experienced a revolution. Respected consultants such as Gartner have become increasingly vocal in their firm recommendation that organizations should minimize and often remove administrator rights. But server administrators (sysadmins) are surely a different kettle …

Articles
Read More

25 Years of Internet and Cyber Security Developments

With 600 million websites now in existence and 200,000 new threats appearing every minute according to McAfee, security professionals are under ever more pressure to try and secure the endpoint against an increasingly complex background. From the Morris worm to Heartbleed, this infographic depicts a…

Infographics
Read More

Achieving Regulatory Compliance

As greater emphasis is placed on complying with industry and government regulations, securing data as it passes through personal computer systems is crucial to satisfy auditors to protect systems against data loss and reputational damage. These include: Payment Card Industry Data Security Standard …

Whitepapers
Read More

Avecto & SANS Critical Security Controls

The SANS Institute was established in 1989 as a cooperative research and education organization and is now the largest source for security training and certification in the world. Derived from the most common attack patterns and vetted across government and industry bodies, the 20 Critical Controls …

Datasheets
Read More

Least Privilege in the Data Center

More than 50% of IT security professionals say their sysadmins pose a moderate to high risk to their network according to research from McAfee. Removing excess administrator privileges is considered to be one of the most essential risk mitigation strategies for organizations and IT departments glob…

Use Cases
Read More

For the third consecutive year, Avecto has analyzed the findings of the known vulnerabilities published by Microsoft. The report compares the annual trends and reveals a 52% uplift in the number of reported vulnerabilities.

Resource Type