October 15th, 2015
We’re often asked how Defendpoint works in a datacenter environment, how customers can achieve the same level of control over servers as they can with their endpoints.
When it comes to data breaches, servers represent one of the largest targets for both external and insider attacks. The risks around servers are often amplified by the fact that users login with highly privileged accounts.
- August 3rd, 2017
Navigating the polarised opposites of security and freedom is not easy.This is further compounded when IT departments are under pressure to bring new systems to market that will provide their organisations with a competitive edge.
- July 6th, 2017
As an industry, people who develop software and online services have taken great leaps over recent years in developing attractive, usable products. But there can still be a reluctance to test things early and often with users – especially if you’re developing for internal or enterprise users.
- June 7th, 2017
Avecto has an illustrious history of providing enterprises with control at the same time as ensuring user freedom. By enabling organizations around the world to remove admin rights and put in place realistic application whitelisting, we raise the security bar while helping people achieve compliance and reduce operational costs.
- January 16th, 2017
It’s often said that you can either have security or you can have usability, but you can’t have both. Before I worked for a security company I believed this accepted wisdom without question – security was going to be something frustrating and annoying that would get added to my design at some point.
- December 1st, 2016
Lola Oyelayo was formerly Director of Strategy & User Experience at Head, and a few weeks ago I was lucky enough to see her excellent talk on Wicked Problems at NUX5. I was even luckier to have the opportunity to chat to her the evening before about how designers can tackle complex problems in digital projects.