aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
12/15/2017 2:20:58 PM
Contributor:
James Maude

5 cybersecurity predictions for 2018

What changes will organizations have to adapt to if they’re to stay secure? What technology should they adopt to achieve this? And how will new regulations (like GDPR) affect the way data is stored and protected?

Courtesy of our Security Analyst James Maude, here are our top five predictions for the year ahead…

Continue reading
Date published
10/25/2017 12:57:46 PM
Contributor:
Marco Peretti

Trusted Application Protection

With the release of Avecto Defendpoint v5.0 we have not only made implementation faster and easier with our Quick Start policy but also increased the security of our customer's endpoints as well. This security boost comes in the form of Trusted Application Protection (TAP), a new feature designed to neuter the common attack techniques that plague organisations today.

Continue reading
Date published
10/18/2017 8:46:37 AM
Contributor:
Ananth Appathurai

Avecto and McAfee: Celebrating Success!

For too long we’ve seen organizations unable to successfully operationalize their security investments because they are difficult to implement or their security products work in isolation. Organizations need to connect the dots for greater contextual insight into the threats they face in order to build a defense strategy based on meaningful, real-time intelligence.

Continue reading
Date published
10/17/2017 12:26:54 PM
Contributor:
Andrew Avanessian

Cyber security is easy! Don’t believe me? It’s all about quick and effective implementation

I know from my experience of deploying privilege management in global organizations that people think it’s going to be hard. Every organization is facing an endpoint security balancing act. On one hand employees, and their endpoints, need to be secure. But on the other hand, many employees require a free and flexible operating environment.

Continue reading
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. ...
  7. 26