Wham, bam thank you PAM

As the Privileged Access Management (PAM) market matures, two distinct approaches have evolved as the primary focus for organizations considering this type of investment. Last year, the trend led Gartner to redefine the classification of the PAM market into two main categories; Privileged account and session management (PASM) and Privileged elevation and delegation management (PEDM). I’ve given a quick description of these areas below:

Continue Reading


The culture shock (Part 1)

In this blog post, I want to share some of my experiences on how company culture can kill a security project, especially when removing admin rights.

Continue Reading


The endpoint security paradox

One thing that troubles me when speaking to clients, from SMBs to truly global enterprises, is a number of times I see technology driving security strategies and not the business requirements. So many organizations work in silos and not co-ordinating their IT security strategy. It is important to understand WHY you are embarking on a particular security project and how this fits with the wider strategic goals of your company. This, of course, takes longer to start with but significantly shortens deployment life cycles and wasted effort.

Continue Reading


2017 predictions: Looking forward to a new year in cyber security

As another busy year in cyber security draws to an end, our team shares their thoughts on the trends and issues we should keep an eye out for in 2017.  How can we stay protected against the latest threats? I asked our experts for their views and we’d be interested to hear your predictions too…

Continue Reading


Taking COMmand of your Privileges

Least privilege was first put forward as a design principle by Jerry Saltzer and Mike Schroeder 40 years ago [1]. Avecto, along with many others, has championed least privilege and our 5 reasons to love least privilege shows that it is key to mitigating attacks.

Continue Reading