Articles

24 items
A quick guide to stopping Shamoon

Shamoon is an attack campaign delivering an aggressive malware strain which destroys target systems by wiping data rendering them unable to boot. Find…

Webinar Q&A with Chris Sherman, security analyst at Forrester

In this article, we ask Forrester’s Chris Sherman four burning questions on today’s key security trends.

Challenges of enterprise Mac management

In this short article we’ll help you understand the security state of play, and provide simple tips for gaining control of your Mac securit

Endpoint vs network security - where to start?

With 327 new threats every minute, or more than five every second, how can businesses stay a step ahead of evolving and increasing attacks?

The biggest threat facing finance

From the SWIFT hack to the Tesco Bank breach, there are a growing number of examples of why cyber security is an issue businesses cannot afford to ign…

Defendpoint: Real-world healthcare breach analysis

This bitesize article analyzes a recent healthcare ransomware attack and discusses how Defendpoint can proactively immunize endpoints against a broad …

Managing privileges: PIM vs PM

In this article, we take a closer look at two ways you can deal with this - Privileged Identity Management (PIM) and Privilege Management (PM) - and e…

Least is the new less privilege

In this thought provoking article, Microsoft security expert, Russell Smith examines the limitations of Windows User Account Control and why least is …

UK CESG 10 steps to cyber security

The CESG's 10 step guide provides a foundation for effective risk management, a framework to improve an organizations security posture. Each area is d…

5 good reasons why you can’t risk giving admin rights to your server administrators

This article looks at the five top reasons why running server administrators with full admin rights no longer represents an acceptable level of risk, …

Content Isolation technology: A safety net for online threats

This article looks at the benefits of Defense in Depth and how a sandboxed web browser serves as a solution to mitigating the biggest window of opport…

Guide to the recommendations of the Australian DoD

In this short guide, we review the top four mitigation strategies identified by the Australian DoD recommendations as essential for over-coming cyber …

Practical guide to mitigating today's real world attacks

This short guide looks at the “First Five Quick Wins” identified by SANS for overcoming the latest advanced targeted threats and how to best implement…

The one big thing you can do to mitigate cyber attack advances

This article reveals why Privilege Management is the one big thing you can do today, to immediately prevent cyber attacks and empower your users with …

How to simply achieve HIPAA compliance

In this short article, we take a look at the requirements of HIPAA / HITECH with a simple guide to achieving compliance via the COBIT framework.

Windows Server 2003 expiration brings defense in depth to life

This article takes a closer look at the issues around WS2003 and how your migration can actually be catalyst for positive security change.

5 ways to optimize your endpoint protection strategy with Avecto & McAfee

In this short article, we share 5 tops for optimizing your endpoint protection strategy with Avecto’s Defendpoint technology integrated with McAfee.

7 ways to crack Windows 7

In this informative bite size article, Microsoft MVP Sami Laiho examines and explains seven different vulnerabilities in Windows 7 demonstrating why t…

Don't give in to user privilege demands in Windows 7

In this article, Windows security expert, Russell Smith discusses migration to Windows 7/8 and the various challenges of implementing a least privileg…

How to simply achieve PSN compliance

In this paper we take a closer look at PSN, which replaced the Government Secure Intranet Code of Connection in November 2012, and outline how Avecto …

How to simply achieve Sarbanes-Oxley (SOX) Compliance

In this article, Microsoft security guru Russell Smith provides an overview of the requirements of SOX and how Defendpoint helps organizations achieve…

How to successfully balance IT security and user privacy rights

In this paper we've put the focus on activity logging, helping you get the right balance between user privacy rights and IT security.

How to simply achieve ISO/IEC 27001 compliance

Read this short article to find out the roles least privilege and application control have to play in ISO/IEC 27001 compliance.

5 ways to optimize your endpoint protection strategy with Avecto & Intel Security

Read this article for 5 tips for optimizing your endpoint protection strategy with Avecto’s Defendpoint technology integrated with Intel Security.

Infographics

15 items
Why proactivity pays

Instead, it's better to take a proactive approach, starting at the endpoint and building out. In this infographic we show why reactive solutions are f…

The cyber threat to the financial sector

Discover the facts surrounding the cyber threat to the financial sector with this infographic.

A unique approach to application whitelisting

But, traditional whitelisting doesn't come without its challenges. In this infographic we outline some of the usual pros and cons, and reveal how Avec…

2016 security predictions

What lessons can we learn from 2015 when it comes to IT security? And what's in store for 2016? Plus, read predictions for 2016 including the thoughts…

Mac security myths

While OS X was once more secure than Windows, advancements in security have seen Microsoft eclipse Apple, with Macs now presenting a soft target for h…

Security snapshot: 2015's threats

In this infographic, we present more detail on the very latest research into 2015's cyber security threat, alongside the most effective ways to proact…

Admin privileges - A hidden threat

In this infographic we take a closer look at the hidden threat of administrator privileges and how combining privilege management, application control…

25 years of internet and cyber security developments

From the Morris worm to Heartbleed, this infographic depicts a short history of internet milestones and cyber security developments spanning over 25 y…

Avecto in numbers

This infographic provides a snapshot of Avecto's expertise, showing your solution is in safe hands - from the World's largest banks to major aerospace…

The digital office worker

This infographic shows the key trends affecting business and how security can be an enabler of productivity through a proactive approach.

Overcoming cyber attacks at the endpoint

In this infographic, we look at the key cyber challenges faced by today's businesses and how to prevent cyber attacks through simple proactive securit…

Avecto support services

Avecto protects over 4 million endpoints in organizations all over the world. Our consultative approach delivers technical solutions to commercial cha…

Snapshot of Mac security 2015

You almost certainly have Macs in your business, connecting to your network and downloading files on a daily basis, but just how secure is your Mac es…

Defendpoint in numbers

This infographic offers a snapshot of our expertise, showing your solution is in safe hands. It also outlines the key benefits of Defendpoint ePO edit…

The time is now - Migrating from XP to Windows 7/8

In this detailed infographic we shine a light on the security and cost implications of slow migration to a newer Windows OS and uncover the productivi…

Whitepapers

10 items
Building secure endpoints with Windows 10 and Defendpoint

In this paper, we’ll take a closer look at the benefits and limitations of Windows 10 and share real world examples of how Avecto’s Defendpoint softwa…

Achieving regulatory compliance

This whitepaper discusses the concept of layered security for desktop computers; why it's needed to achieve compliance requirements set out by regulat…

CPNI Critical Security Controls for effective cyber defense

In this whitepaper we cover the internationally recognised baseline standard of information security best practices developed by the Centre for Intern…

Complying with the Defence Cyber Protection Partnership

The growing risk of threats from malicious actors has led to the Ministry of Defence improving the protection of the defence supply chain with the rel…

EU GDPR guide to protecting PII

Avecto looks at the role that privilege management, application control and sandboxing solutions play in complying with the EU General Data Protection…

Guide to meeting requirements of MAS

In this whitepaper we take a closer look at the Monetary Authority of Singapore's Technology Risk Management document and how you can comply with it.

Guide to meeting the requirements of PCI DSS 3.2

The Payment Card Industry Data Security Standard (PCI DSS) is a compliance mandate with implications for organizations that handle credit card data. T…

Guide to meeting requirements of USGCB

In this paper we cover how it differs from its predecessor FDCC, advise how best to implement it and outline how Avecto Defendpoint can help you achie…

Guide to the NIST Cybersecurity Framework

This voluntary code encourages organizations to evaluate their risk position and implement the appropriate levels of control. In this paper we take a …

UK Government Cyber Essentials Scheme

In this short paper, Avecto looks at the importance of the UK government's Cyber Essentials Scheme and the steps you can take to ensure compliance.

Webinars

14 items
Know your threats: Ransomware uncovered

Join ransomware expert James Maude for this on demand webinar as he gives his analysis of this growing threat and shares advice to help you stay a ste…

The psychology of security: Stop social engineering attacks

Join us for our on-demand social engineering webinar, where cyber security expert Dr Jessica Barker will examine the psychology behind these attacks a…

Motivations of a Mac hacker

This on-demand webinar with Mac expert Patrick Wardle will expose some of the fundamental flaws affecting OS X security. Importantly, Patrick will sha…

A hacker's guide to ransomware

Join world-renowned independent security expert Paula Januszkiewicz for a hacker's guide to ransomware. In this on-webinar you'll learn about code exe…

Containing the outbreak: The healthcare security pandemic

In this lively webinar Avecto Senior Security Engineer James Maude offers advice to help you avoid becoming a victim of ransomware attack.

The hacker’s perspective: The hunt for admin rights

Sharing the motivations of a hacker, Sami exposes how and why admin rights are so often sought by attackers and insiders as the way in to stealing IP …

Know your enemy; choose your weapons wisely

This on-demand webinar led by Pulitzer Prize winning journalist Byron Acohido breaks through the white noise. Acohido will drill down on recent innova…

How does proactive security pay?

Join security journalist and blogger Dan Raywood on this live webinar to find out what happens when security goes wrong and how to avoid falling into …

Why are Macs a hacker's dream?

As Macs become an increasingly popular choice for organizations, is the business community taking the risks they pose seriously? Mac security expert, …

Whitelisting: Is it a silver bullet?

On this 30 minute on-demand webinar, Andrew Avanessian, Vice President at Avecto explains why whitelisting alone is not the answer.

Admins under attack - Why least is the new less

With attackers now seeking out local administrators to gain access to the operating system, even a small number of admin accounts can open the door to…

Hear from a hacker: The hidden flaws in Windows

Join Microsoft MVP Sami Laiho as he demonstrates how today's hackers can take advantage of the flaws in Windows technologies to breach your organizati…

Defending against advanced targeted threats with the SANS Critical Controls

In this on-demand webinar led by the SANS Institute, you will learn how combining privilege management, application control and sandboxing results in …

Security secrets - Does Windows 10 change the game?

Learn what's new in Windows 10 and 8.1 and learn from someone else's mistakes! Join Security expert and Microsoft MVP, Paula Januszkiewicz in this ene…

Reports

11 items
Why a proactive approach to cyber security pays dividends

In this report, we'll show you why it's better to secure the known, rather than chasing the unknown and explain how Defendpoint maps to Gartner's Adap…

State of Mac security 2016: Enterprise Mac management

Read this report for a pulse check of Mac enterprise adoption, an examination of the reasons behind their growing popularity and crucially, how to ove…

Microsoft vulnerabilities report 2015

For the third consecutive year, Avecto has analyzed the findings of the known vulnerabilities published by Microsoft. The report compares the annual t…

Cyber threats report

Download this unique report to learn more about the latest malware threats facing your business and why a solid and proactive endpoint security postur…

Building the business case for proactive security

This whitepaper takes a closer look at the commercial impact of IT security and how to build a compelling business case for a proactive approach that …

Know your threats: Ransomware uncovered

This report covers what ransomware is, how it works, the damage it causes, predictions for the future and, crucially, how to prevent it with a simple …

Know your threats series: Social engineering

Social engineering attacks are becoming more common and sophisticated. Figures show the number of phishing sites and associated email traffic increase…

Guide to defense in depth: Your relationship with risk

In this first chapter of our C-level guide to defense in depth, Windows security expert Russell Smith takes a closer look at the relationship we have …

Guide to defense in depth: The hidden flaws in Windows

In the second chapter of our C-level guide to defense in depth, ethical hacker and Microsoft MVP Sami Laiho examines the Windows platform and explores…

Microsoft vulnerabilities report 2014

Now in its second year, the Microsoft Vulnerabilities Report analyses data from Patch Tuesday Security Bulletins issued by Microsoft throughout 2014.

Microsoft vulnerabilities report 2013

This report has been compiled by Avecto through the analysis of data from Security Bulletins issued by Microsoft throughout 2013.

Datasheets

10 items
Defendpoint product brochure

Discover more about Defendpoint and its capabilities by downloading our product brochure.

Defendpoint datasheet

Read our Defendpoint datasheet to find out how it proactively stops cyber attacks at the endpoint by combining privilege management, application contr…

Defendpoint for Mac datasheet

Download the Defendpoint for Mac data sheet for the technical benefits of this innovative least privilege solution.

Defendpoint ePO datasheet

Read our datasheet to find out more about the benefits of choosing Defendpoint ePO edition, including how it offers single console visibility alongsid…

Defendpoint deployment and management options

When it comes to deploying Defendpoint you have a choice of three management platforms - Group Policy edition, ePO edition and iC3 edition. The same a…

Enterprise reporting datasheet

Get more out of your security deployment through Defendpoint Enterprise Reporting. Providing insight and intelligence you can discover, manage and mon…

Defendpoint iC3 datasheet

Find out more about our Intelligent Communication, Coordination and Control (iC3) cloud-based platform for Defendpoint with our datasheet.

McAfee + Avecto solutions brief

Discover how Defendpoint integrates with McAfee ePO to provide security strength and depth, offering robust protection against advance threats on the …

Avecto & SANS Critical Security Controls

This document focuses on the SANS First Five Quick Wins for overcoming the latest Advanced Targeted Threats and how Avecto's Defendpoint technology ca…

Deep dive: Content isolation

Relying on detection alone is not enough to prevent cyber attacks. Defendpoint leverages the Windows security model to achieve content isolation that …