Featured

Contributor:
Kris Zentek
February 20th, 2012

Policy Filtering for Computers and Remote Clients

For version 3.0, we have redesigned the how Policy Filters are configured and applied. Two distinct benefits came out of this.

  1. Granular targeting is now a lot more intuitive in terms of applying combinations of Policy Filters.
  2. It is now a lot easier for us to add additional filters to Privilege Guard.

The new Computer Filter allows you to target Privilege Guard (Edit: now Defendpoint) Policies based on the hostname or the IP Address of the endpoint. This can be used as an alternative to, or in combination with, Group Policy based computer targeting.

Continue Reading

Endpoint security success…balance is key!

Navigating the polarised opposites of security and freedom is not easy.This is further compounded when IT departments are under pressure to bring new systems to market that will provide their organisations with a competitive edge.

Continue Reading


ATM: Another Targeted Machine

Last week marked the 50th anniversary of the ATM, a device that changed the face of personal monetary transactions forever. According to the ATM Industry Association (ATMIA) there are now close to three million of them worldwide, with over 70,000 in the UK alone where it all began.  On 27th June 1967, the world’s first “hole in the wall” was revealed at Barclays Bank in Enfield, London. Celebrations aside, I’d like to look at exactly what’s going on under the hood from a software perspective.  Is securing them through industry best practice realistic and practical?

Continue Reading


NotPetya ransomware: Attack analysis

On June 27, 2017 a number of organisations across Europe began reporting significant system outages caused by a ransomware strain referred to as Petya. The ransomware is very similar to older Petya ransomware attacks from previous years, but the infection and propagation method is new, leading to it being referred to as NotPetya. Due to the sudden and significant impact of the attack, it was immediately likened to the WannaCry outbreak causing concerns globally. 

Continue Reading


Wham, bam thank you PAM

As the Privileged Access Management (PAM) market matures, two distinct approaches have evolved as the primary focus for organizations considering this type of investment. Last year, the trend led Gartner to redefine the classification of the PAM market into two main categories; Privileged account and session management (PASM) and Privileged elevation and delegation management (PEDM). I’ve given a quick description of these areas below:

Continue Reading


The culture shock (Part 2)

In part 1, I discussed the importance of understanding your company’s culture when embarking on a security project as this can be the key to success or failure. In this blog, I’ll take a closer look at the five key areas you should pay particular attention to.

Continue Reading