Featured

Contributor:
Paul Kenyon
July 9th, 2013

How to deliver ultimate security whilst reducing costs

64% of IT security professionals believe malware incidents to be a significant reason for the increase in IT operating expenses (2013 State of The Endpoint, Ponemon)

Today’s malware is increasingly sophisticated, taking advantage of normal user behavior to gain a foothold within your organization.  Web browsers, media plugins, Java exploits and removable media are amongst the most common vectors of introduction and each of these require an unknowing user at the keyboard to access the ‘trojan’ content.

Continue Reading

Beware the USB Stick!

Privilege Guard v3.8 introduces Drive Rule

The Drive Rule is a new validation rule that lets you match applications being executed from particular types of drive.  Not too dissimilar in concept to the file path rule (where applications are matched based on their directory location), the drive rule lets you target the drive itself.

Continue Reading