aidarrow-end-inversearrow-endarrow-left-angulararrow-left-angularWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareArticleUse caseWebinarResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
5/30/2018 2:42:35 PM
Contributor:
Gary Lombardo

Picking up where Microsoft leaves off with modern management

As part of Windows 10, Microsoft has touted modern management as an approach that drives improved security and nimble IT operations, resulting in happy users and lower cost for organizations. However, fully realizing the promised benefits of modern management requires more than Microsoft can deliver...

Continue reading
Date published
10/18/2017 8:46:37 AM
Contributor:
Ananth Appathurai

Avecto and McAfee: Celebrating Success!

For too long we’ve seen organizations unable to successfully operationalize their security investments because they are difficult to implement or their security products work in isolation. Organizations need to connect the dots for greater contextual insight into the threats they face in order to build a defense strategy based on meaningful, real-time intelligence.

Continue reading
Date published
10/17/2017 12:26:54 PM
Contributor:
Andrew Avanessian

Cyber security is easy! Don’t believe me? It’s all about quick and effective implementation

I know from my experience of deploying privilege management in global organizations that people think it’s going to be hard. Every organization is facing an endpoint security balancing act. On one hand employees, and their endpoints, need to be secure. But on the other hand, many employees require a free and flexible operating environment.

Continue reading
Date published
9/22/2017 1:00:35 PM
Contributor:
James Maude

SEC hack acts as another security wakeup call

The U.S. Securities and Exchange Commission (SEC) has revealed that it’s fallen victim to a hack. In its recent “Statement on Cybersecurity, published by its Chairman, Jay Clayton, it was revealed that its controversial Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system had been compromised last year and "may have provided the basis for illicit gain through trading".

Continue reading
Date published
8/31/2017 12:46:46 PM
Contributor:
Andrew Avanessian

CeX sees 2 million customer details compromised

CeX, the second-hand electronics, and video games retailer has reportedly had the details of two million customers compromised by hackers. The information stolen included names, addresses, email addresses and some phone numbers, as well as a small number of encrypted credit card details.

Continue reading
Date published
8/3/2017 12:32:54 PM
Contributor:
Andrew Avanessian

Endpoint security success…balance is key!

So many times, I have seen security become an afterthought, rather than being an integral part of a design from the outset. Good security design is not always visible and therefore often not very well understood by the c-suite, who pile on the pressure to release systems or improve user freedom.

Continue reading
  1. 1
  2. 2
  3. 3
  4. 4