Featured

Contributor:
Andrew Avanessian
May 13th, 2017

WannaCry Ransomware goes global

On Friday, a cyber attack on an unprecedented scale struck a wide range of organizations in over 99 countries across the globe. The ransomware attack, known as WanaCry or WanaCrypt0r shut down IT systems in NHS hospitals and GP surgeries in the UK as well as many large global organizations including Telefonica, FedEx and Renault.

Continue Reading

Enterprise Security and Improved Usability with Privilege Guard 2.8

Today we are very pleased to announce the release of Privilege Guard 2.8 (Edit: now Defendpoint).

This new version is packed with exciting and innovative new features, which deliver enterprise security enhancements and improved usability. The world’s leading privilege management solution has just got a whole lot better!

Continue Reading


Deploying Privilege Guard with NetIQ GPA

Avecto Privilege Guard (Edit: now Defendpoint) is implemented as a Group Policy Extension, which allows it to integrate seamlessly with solutions that enable advanced management of Group Policy. This includes Microsoft’s Advanced Group Policy Management (AGPM), which is part of the Microsoft Desktop Optimization Pack (MDOP), but other vendors have solutions in this space too, such as NetIQ with their Group Policy Administrator (GPA).

Continue Reading


Privilege Guard Master Class

I often get asked about best practices when configuring Privilege Guard (Edit: now Defendpoint), so I thought I’d take the time to demonstrate some of the flexible ways the product can be used to implement least privilege.

Continue Reading


Rules are made to be broken – IT security policy and controls

SMEs often manage without one, and larger companies have it in their staff handbooks, but an IT security policy without the controls to enforce it is of little value, and only useful for assigning blame when something inevitably goes awry.

Continue Reading


Configure Application Whitelisting for Citrix GoToMeeting

One of the comments I receive most frequently from attendees of my Least Privilege webinar is that web conferencing software, such as Citrix’s popular GoToMeeting, prevents IT departments moving forward with least privilege on the desktop. This kind of software can pose a problem as users are often requested to join meetings at short notice and need to install a client program to participate in the conference. In this post I’ll focus on GoToMeeting, but some of the information could also be applied to other software.

Continue Reading