It’s a very exciting time at Avecto. Not only are we celebrating our 10-year anniversary this year, but we’re also announcing that Bomgar, a leader in identity and access management solutions, is to acquire the company.
Active Directory (AD) is the core of a Windows Server network and consists of a database that stores usernames and passwords, plus several technologies that work together to provide security and management services to clients and servers. Domain controllers (DCs) are servers that host a copy of the AD database and run related services.
This is a question I get all the time, so I thought I'd take a moment and share some thoughts on this question. Before we get to "What is the right amount of GPOs", let’s start off with "Can I have too many GPOs?"
Before implementing a least privilege desktop policy it is generally good practice to know who you are likely to affect. This is not an easy task if you do not already manage or track which users have previously been given local admin rights on their devices.
Desktop security may seem to have little to do with an organization’s profit and loss, share prices and overall bottom line, but going beyond antivirus protection can have a significant impact on productivity, total cost of ownership and IT support costs.
The consumerisation of IT has become a fashionable catch phrase over the past few years as some companies choose to give employees the option to decide what hardware and software they use at work. Schemes have been set up, such as Bring Your Own PC (BYOPC), where virtualization technologies are deployed that allow users to run a managed corporate desktop from their own device with the aim of reducing costs.
Privilege Guard 2.8 (Edit: now Defendpoint) introduces the ability to digitally sign policies using a certificate from a PFX file. This ensures that the policies deployed to a client have been published by a trusted source and are genuine. A unique Object Identifier (OID) is used to verify that policies have been signed with an authorized certificate.
Privilege Guard 2.8 (Edit: now Defendpoint) is the first privilege management solution to introduce an intelligent anti-tamper mechanism that can protect the Privilege Guard software and configuration settings against modification from elevated processes, while still allowing the solution to be administered by true system administrators.
Today we are very pleased to announce the release of Privilege Guard 2.8