Featured

Contributor:
Mark Austin
May 12th, 2011

Privilege Guard 2.7 and Enhanced UAC Integration

Privilege Guard (Edit: now Defendpoint) first introduced UAC (User Account Control) integration in version 2.5, which enables rules to be defined that trigger when an application requires administrator privileges in order to run. Further enhancements to the UAC rule in version 2.7 now allow you to elevate applications that may trigger UAC after the application has already launched. For instance, disk defragmenter and task manager are two applications that launch with standard user rights and only trigger UAC when the user attempts to perform an operation that requires administrator privileges.

Continue Reading

Zero days – The return of Dridex

The Dridex banking Trojan, once one of the most active and prolific malware strains, went quiet back in the summer of 2016. The large-scale spam operations distributing it dried up and the few samples that still appeared showed no significant changes. This appears to have represented a period where the attackers were retooling as Dridex has returned with fury and a spam campaign spearheaded by malicious Word documents exploiting a zero day vulnerability in Microsoft Office.

Continue Reading


Avecto partner focus: Crestan

 Sandra Salame, Operations Manager at Crestan, talks about the benefits of a partnership with Avecto and discusses our successful Middle East roadshow featuring award-winning speaker and Microsoft MVP Sami Laiho.

Continue Reading


The endpoint security paradox

One thing that troubles me when speaking to clients, from SMBs to truly global enterprises, is a number of times I see technology driving security strategies and not the business requirements. So many organizations work in silos and not co-ordinating their IT security strategy. It is important to understand WHY you are embarking on a particular security project and how this fits with the wider strategic goals of your company. This, of course, takes longer to start with but significantly shortens deployment life cycles and wasted effort.

Continue Reading


Avecto’s channel predictions for the year ahead

A new year brings with it a new set of security challenges. From the escalation of ransomware and social engineering to the Internet of Things and the continued security headache that presents. Keeping pace with these challenges and staying one step ahead of cyber crime will be critical for security vendors but it also has a significant knock-on effect for the channel.

Continue Reading


How proactive protection can eclipse Shamoon

In recent days, Saudi Arabia has warned organizations in the kingdom to be on the alert for the Shamoon computer virus, a variant of which gained notoriety after being linked to attacks against Saudi Aramco in 2012 and reportedly damaged over 30,000 systems.

Continue Reading