May 13th, 2017
On Friday, a cyber attack on an unprecedented scale struck a wide range of organizations in over 99 countries across the globe. The ransomware attack, known as WanaCry or WanaCrypt0r shut down IT systems in NHS hospitals and GP surgeries in the UK as well as many large global organizations including Telefonica, FedEx and Renault.
- September 21st, 2011
The consumerisation of IT has become a fashionable catch phrase over the past few years as some companies choose to give employees the option to decide what hardware and software they use at work. Schemes have been set up, such as Bring Your Own PC (BYOPC), where virtualization technologies are deployed that allow users to run a managed corporate desktop from their own device with the aim of reducing costs.
- September 20th, 2011
Privilege Guard 2.8 (Edit: now Defendpoint) introduces the ability to digitally sign policies using a certificate from a PFX file. This ensures that the policies deployed to a client have been published by a trusted source and are genuine. A unique Object Identifier (OID) is used to verify that policies have been signed with an authorized certificate.
- September 19th, 2011
In version 2.8 of Privilege Guard (Edit: now Defendpoint) we have revamped the application group management to include:
- September 16th, 2011
Privilege Guard 2.8 (Edit: now Defendpoint) is the first privilege management solution to introduce an intelligent anti-tamper mechanism that can protect the Privilege Guard software and configuration settings against modification from elevated processes, while still allowing the solution to be administered by true system administrators.
- September 15th, 2011
New to version 2.8 is the ability to include a hyperlink in the end user messages. This feature further extends the information that the IT department can provide to end users, by offering direct links to intranet portals and online helpdesks.