November 8th, 2016
- October 15th, 2015
We’re often asked how Defendpoint works in a datacenter environment, how customers can achieve the same level of control over servers as they can with their endpoints.
When it comes to data breaches, servers represent one of the largest targets for both external and insider attacks. The risks around servers are often amplified by the fact that users login with highly privileged accounts.
- June 5th, 2015
The biggest security threat of 2015?
Microsoft’s support programme for Windows Server 2003 (WS2003) is currently in the extended support phase, which is scheduled to cease on 14 July 2015. After that date, if a new security vulnerability is discovered, there is no commitment that a fix will be produced and released by Microsoft, nor will it address non-security defects or assist customers that encounter problems.
- August 19th, 2013
Plans to reduce admin numbers by 90% have probably been misunderstood
A year ago, few beyond the realms of computer security, politics and journalism had even heard of the US National Security Agency (NSA) let alone could explain what it did. Then the Edward Snowden affair happened and suddenly one of the world’s most secretive organizations overnight turned into one which has had its every action and statement pored over with huge fascination.
- August 12th, 2013
Administrators, privileged network deities or just a type of ordinary network user much the same as anyone else? Years into an age where IT security has become a mainstream topic, this remains the sort of polarizing question that can provoke one of two reactions; shock or relief.
- August 5th, 2013
Remote Administration of Servers and Desktops with Least Privilege
Microsoft PowerShell is an essential tool to manage and administer servers and desktops in the enterprise. As time passes, an increasing array of Microsoft Windows operating system components and Windows applications are being automated through PowerShell cmdlets. Since PowerShell has a secure remote connection capability, administrators work from their own computer to manage many remote machines. However, this efficient administrative practice requires IT Staff to have admin rights on hundreds or thousands of desktops and servers in the organization.