November 27th, 2012
It’s important for a privilege management solution to protect itself from tampering and to prevent users from circumventing the solution. Privilege Guard (Edit: now Defendpoint) already has a sophisticated anti-tamper mechanism that protects the Privilege Guard software and configuration settings against modification from elevated processes, while still allowing the solution to be administered by true system administrators. This has now been complemented by the new Privileged Account Management capability in Privilege Guard 3.6, ensuring that Privilege Guard continues to be the most secure and flexible privilege management solution on the market.
- May 13th, 2016
Least privilege was first put forward as a design principle by Jerry Saltzer and Mike Schroeder 40 years ago . Avecto, along with many others, has championed least privilege and our 5 reasons to love least privilege shows that it is key to mitigating attacks.
- March 7th, 2016
The challenge of finding the right balance between giving too many admin rights vs. too little admin rights is often talked about from the end user perspective, however the same challenge applies to those managing the IT department itself and this is a part of the journey that is often overlooked.
- February 8th, 2016
Last week saw the launch of the latest Microsoft Vulnerabilities Report, Avecto’s leading research project into the security bulletins issued by the software giant over the past 12 months. Now in its third year, the report has consistently provided intriguing insight into today’s threat landscape, the common attack vectors and the products within the Microsoft portfolio that cause IT departments the most sleepless nights.
- February 3rd, 2016
“We’ve done it!” – The majority of your users have admin rights removed, meaning your environment is far more secure than it was before and you’ve successfully mitigated 85% of critical vulnerabilities in Windows. But are you as secure as you think? A surprisingly common pitfall that we come across in the support team are those who, either intentionally or unwittingly, elevate everything. Everything.
- February 2nd, 2016
Now in its third year, the 2015 Microsoft Vulnerabilities Report analyses the data from Security Bulletins issued by Microsoft throughout 2015. Typically issued on the second Tuesday of each month, these “Patch Tuesday” bulletins contain fixes for vulnerabilities affecting Microsoft products. With the launch of Windows 10, this approach changed slightly, with patches being released as soon as they are available.