Featured

Contributor:
Kris Zentek
August 2nd, 2013

Mitigate Operational Risk: Service Control in Privilege Guard 3.8

Privilege Guard becomes the only privilege management solution to provide control of Windows Services

Services play an integral part of endpoint functionality – they are components of many desktop products, and almost all server implementations. On desktops, services run in the background across multiple user sessions, most commonly for products such as antivirus, firewalls and other security products. On servers, many roles function as services because of the performance and high availability requirements of applications in the datacenter.

Continue Reading

The endpoint security paradox

One thing that troubles me when speaking to clients, from SMBs to truly global enterprises, is a number of times I see technology driving security strategies and not the business requirements. So many organizations work in silos and not co-ordinating their IT security strategy. It is important to understand WHY you are embarking on a particular security project and how this fits with the wider strategic goals of your company. This, of course, takes longer to start with but significantly shortens deployment life cycles and wasted effort.

Continue Reading


Avecto’s channel predictions for the year ahead

A new year brings with it a new set of security challenges. From the escalation of ransomware and social engineering to the Internet of Things and the continued security headache that presents. Keeping pace with these challenges and staying one step ahead of cyber crime will be critical for security vendors but it also has a significant knock-on effect for the channel.

Continue Reading


How proactive protection can eclipse Shamoon

In recent days, Saudi Arabia has warned organizations in the kingdom to be on the alert for the Shamoon computer virus, a variant of which gained notoriety after being linked to attacks against Saudi Aramco in 2012 and reportedly damaged over 30,000 systems.

Continue Reading


Customer Success: It Takes A Village

Recently I was in a meeting discussing a customer that had been particularly slow to adopt our solution and someone said to me “Isn’t that your job?” and for a moment I felt personally culpable for the failure of a speedy time-to-value for customer X.

Continue Reading


2017 predictions: Looking forward to a new year in cyber security

As another busy year in cyber security draws to an end, our team shares their thoughts on the trends and issues we should keep an eye out for in 2017.  How can we stay protected against the latest threats? I asked our experts for their views and we’d be interested to hear your predictions too…

Continue Reading