March 1st, 2012
- September 25th, 2013
User Account Control was a great idea but it has taken privilege management to fulfill its potential
How did computer security get into such a troubled and confused state? It’s a question security professionals must ask themselves on a daily basis as they face demands that threaten to explode budgets while offering no guarantee that any of the expensively-assembled defenses will actually work.
The roots of the malaise goes back to the early years of the millennium when enterprises and consumers using Windows 2000 and Windows XP were suddenly ambushed by waves of clever software attacks that warned the world that criminals had floored an evolutionary accelerator pedal. By the time XP and Windows received its first major security upgrade in the form of Service Pack 2 in 2004, it was becoming clear that security had entered an unsettling era that might take decades to play out.
- August 7th, 2013
Privilege Guard’s UAC Replacement Extends to MSI Packages
For quite some time we have supported Windows Installer packages, empowering standard users to run MSI’s, MSU’s and MSP’s that would require administrator privileges to complete. This functionality is fundamental in most least privilege deployments, where power users are delegated the privilege of choosing their own productivity tools.
- July 19th, 2013
Bad privilege management is as dangerous as none
Utilizing tools native to the operating system to convert Windows networks to an environment in which administrator-level privileges are the justified exception rather than the rule is often mistakenly seen as a discrete destination when it is really part of a long, ongoing, complicated journey.
It’s an easy mistake to make. Many organizations find themselves simultaneously running up to three significant generations of Windows; XP, Windows 7 and Windows 8, plus one or two way points in between such as Vista and Service Packs. Each one of these comes with slightly different ways to manage standard and administrator accounts. These include the evolving controls in User Account Control (UAC) and related technologies such as XP’s prototype whitelisting Software Restriction Policies (SRP) and 7′s AppLocker.
- June 20th, 2013
In an era where 67% of security professionals believe that they do not have ample resource to minimize IT endpoint risk throughout their organization (2013 State of the Endpoint, Ponemon), it has never been more crucial that the IT security projects you prioritize deliver maximum return on investment as well as exceptional security benefits.
Within their 2013 desktop total cost of ownership (TCO) study, research from Gartner continues to advocate the movement of organizations towards a ‘locked and well managed’ environment with respect to user privilege. The cost profile associated with this landscape is coveted by global organizations as it results in TCO savings of almost 30% against a ‘moderately managed’ environment; that’s $1,264 per desktop per year.
- May 21st, 2013
Do you give local administrative rights to all your users? Or maybe it’s just to the executives or laptop users? As companies now have under a year to move away from Windows XP, this is the perfect, once-in-a-decade opportunity to make your environment more secure, raise user productivity and make the lives of your support personnel easier.