aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
1/3/2011 10:11:02 PM
Contributor:
Mark Austin

The Least Risk Windows 7 Desktop

As we begin 2011 this will be the year that many companies will look to move from pilot to production with Windows 7. The migration to Windows 7 is an ideal opportunity to assess the security posture of the corporate desktop.

Continue reading
Date published
9/19/2010 11:29:28 AM
Contributor:
Mark Austin

The Pros and Cons of Windows 7 Application Control with AppLocker

Windows 7 Ultimate and Enterprise editions ship with AppLocker, which is a Group Policy based application control solution. AppLocker is a big improvement over Software Restriction Policies, as it provides a more flexible and intuitive solution to its predecessor. Here we discuss the pros and cons of Windows AppLocker.

Continue reading
Date published
5/19/2010 5:03:17 PM
Contributor:
Mark Austin

10 Reasons to use Privilege Guard over UAC

As many organizations look to migrate to Windows 7, it is an opportune time to review user privileges. User Account Control (UAC) was introduced by Microsoft in Windows Vista, and it has remained much the same in Windows 7, albeit with a few minor tweaks to its default behavior. Although UAC is a welcome addition to Windows, it really doesn’t provide a corporate solution to least privilege.

Continue reading
Date published
3/10/2010 9:38:53 PM
Contributor:
Mark Austin

Centralizing Windows Events with Event Forwarding

If you are interested in centralizing Windows events from your desktops or servers then you should take a serious look at Windows Event Forwarding. Event Forwarding is provided by Windows Remote Management (WinRM) and enables you to get events from remote computers and store them in the local event log of an event collector computer.

Continue reading
Date published
3/7/2010 9:56:09 PM
Contributor:
Mark Austin

5 Tips for Flexible Desktop Lockdown

Desktop lockdown shouldn’t hinder a user from performing their day to day role. Rather, locking down desktops should provide a secure environment in which the user can effectively go about their tasks, without giving them the frustration of being 'locked out'. Here we've provided 5 tips to help you on your way to achieving flexible desktop lockdown.

Continue reading
Date published
2/28/2010 4:03:44 PM
Contributor:
Mark Austin

Embrace Group Policy, It Makes Sense...

It surprises me how few vendors use Active Directory Group Policy as a mechanism to centrally manage and deploy policy settings for their Windows based products, and instead build their own backend infrastructure for this purpose. I could rattle off a long list of benefits, including hierarchical management, a strong security model that includes delegated administration, built-in replication, stability and scalability, to name but a few.

Continue reading
Date published
2/26/2010 2:34:12 PM
Contributor:
Mark Austin

A Brief Introduction to Least Privilege

As a new software release for least privilege leaves the building, it seemed an opportune time to start blogging, not to plug the release of course. Alright, I’m allowed one shameless plug in my first blog given the team have worked so hard on this release.

Continue reading
  1. 1
  2. ...
  3. 21
  4. 22
  5. 23
  6. 24
  7. 25
  8. 26
26