Featured

Contributor:
Mark Austin
February 18th, 2011

Architectural Insight into Microsoft UAC and Avecto Privilege Guard

A recent press release from a competitor made some ill-educated statements about Microsoft User Account Control (UAC) and other user mode solutions that control application privileges. The article picked up on a weakness in UAC that has been publicly known since the beta of Windows 7, and then went on to suggest that user mode solutions are not capable of managing application privileges securely and that elevated processes can only be protected at the kernel level.

Continue Reading

Doing the hard work to make it simple

Avecto has an illustrious history of providing enterprises with control at the same time as ensuring user freedom. By enabling organizations around the world to remove admin rights and put in place realistic application whitelisting, we raise the security bar while helping people achieve compliance and reduce operational costs. 

Continue Reading


Collaboration is King

In April we welcomed the return of the McAfee brand, one of the trailblazers in the ongoing battle against cyber crime. In a well-articulated blog post, McAfee CEO, Chris Young, set out the vision and mission of the #NewMcAfee and laid down its ambitious plans to take the business forward and ultimately shape the security marketplace as never before.

Continue Reading


The endpoint security paradox

One thing that troubles me when speaking to clients, from SMBs to truly global enterprises, is a number of times I see technology driving security strategies and not the business requirements. So many organizations work in silos and not co-ordinating their IT security strategy. It is important to understand WHY you are embarking on a particular security project and how this fits with the wider strategic goals of your company. This, of course, takes longer to start with but significantly shortens deployment life cycles and wasted effort.

Continue Reading


An ounce of prevention is worth a pound of cure

Gartner recently published its paper; “The Real Value of a Non-Signature-Based Anti-Malware Solution to Your Organization”, providing insight into how non-signature approaches to malware prevention can not only prevent attacks but offer reduced footprints on the endpoint. As you would expect Avecto is mentioned as one of the vendors in this space.

Continue Reading


It’s a bug, Jim, but not as we know it

Somewhere, in most organizations’ bug-tracking system, there’s a dark corner. It’s a place where – at best – people go to have an opinionated argument. At worst, it’s a place that bugs go to die. It’s the usability bug receptacle.

Continue Reading