Monthly Archives: November 2012
- November 28th, 2012
Modern IT organizations recognize the cost savings to be gained by empowering users to source and install their own applications, and least privilege provides the layer of security required to grant the use of admin privileges, required for nearly all software installations, without giving the user a full administrator account.
- November 27th, 2012
It’s important for a privilege management solution to protect itself from tampering and to prevent users from circumventing the solution. Privilege Guard (Edit: now Defendpoint) already has a sophisticated anti-tamper mechanism that protects the Privilege Guard software and configuration settings against modification from elevated processes, while still allowing the solution to be administered by true system administrators. This has now been complemented by the new Privileged Account Management capability in Privilege Guard 3.6, ensuring that Privilege Guard continues to be the most secure and flexible privilege management solution on the market.
- November 20th, 2012
Removing administrative privileges from users is always a challenge, but especially in the case of notebook users, who can find themselves on the road with no internet access and requiring support or needing to make a system-wide changes, such as installing a driver or application. As a result, notebook users either get to keep their administrative rights or Privilege Guard (Edit: now Defendpoint) is deployed to track when and why users are elevating privileges.
- November 2nd, 2012
As the myriad of reviews for the Windows RT Surface hit the Internet, it has simply strengthened my stance that I will wait for the Windows Pro Surface or similar Intel powered tablets before considering taking the plunge. It’s not that the Windows RT Surface doesn’t have appeal, but the Windows Pro tablet gives me many more reasons to consider switching to a Microsoft Windows powered tablet.
- November 1st, 2012
Whether a large enterprise or an SMB, every organization experiences IT hindrances that result in support calls to the help desk. Calls might span a variety of issues, from trouble downloading software to something as simple as connecting to a printer. At a glance, these issues seem to stand independently of each other, differing in nature, cause and solution. However, organizations should realize there is often an underlying basis that serves as their common root – admin rights. While this might not immediately stand out as a core weakness, admin rights might be considered the Achilles heel, where one slight misuse could bring the entire organization to its knees.