aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
10/25/2017 12:57:46 PM
Contributor:
Marco Peretti

Trusted Application Protection

With the release of Avecto Defendpoint v5.0 we have not only made implementation faster and easier with our Quick Start policy but also increased the security of our customer's endpoints as well. This security boost comes in the form of Trusted Application Protection (TAP), a new feature designed to neuter the common attack techniques that plague organisations today.

Continue reading
Date published
10/18/2017 8:46:37 AM
Contributor:
Ananth Appathurai

Avecto and McAfee: Celebrating Success!

For too long we’ve seen organizations unable to successfully operationalize their security investments because they are difficult to implement or their security products work in isolation. Organizations need to connect the dots for greater contextual insight into the threats they face in order to build a defense strategy based on meaningful, real-time intelligence.

Continue reading
Date published
10/17/2017 12:26:54 PM
Contributor:
Andrew Avanessian

Cyber security is easy! Don’t believe me? It’s all about quick and effective implementation

I know from my experience of deploying privilege management in global organizations that people think it’s going to be hard. Every organization is facing an endpoint security balancing act. On one hand employees, and their endpoints, need to be secure. But on the other hand, many employees require a free and flexible operating environment.

Continue reading
Date published
7/6/2017 10:40:38 AM
Contributor:
Chris Collingridge

Stop monkeying around: Go guerrilla

As an industry, people who develop software and online services have taken great leaps over recent years in developing attractive, usable products. But there can still be a reluctance to test things early and often with users – especially if you’re developing for internal or enterprise users.

Continue reading
Date published
6/7/2017 9:37:47 AM
Contributor:
Chris Collingridge

Doing the hard work to make it simple

Avecto has an illustrious history of providing enterprises with control at the same time as ensuring user freedom. By enabling organizations around the world to remove admin rights and put in place realistic application whitelisting, we raise the security bar while helping people achieve compliance and reduce operational costs.

Continue reading
Date published
5/31/2017 6:33:01 AM
Contributor:
Ananth Appathurai

Collaboration is King

Last month we welcomed the return of the McAfee brand, one of the trailblazers in the ongoing battle against cyber crime. In a well-articulated blog post, McAfee CEO, Chris Young, set out the vision and mission of the #NewMcAfee and laid down its ambitious plans to take the business forward and ultimately shape the security marketplace as never before.

Continue reading
Date published
4/27/2017 8:52:36 AM
Contributor:
Katy Batley

A call to our customers

Avecto is listed as an official security provider in the Endpoint Protection Platforms category on the Gartner Peer Insights website. In case you aren't familiar with the site, it's a review portal for security leaders and their teams to get anonymous third party feedback on a vendor and their software solutions. We firmly believe this type of resource is a hugely valuable, open and honest way of assessing the security landscape. So this is our rallying call, for Avecto customers to tell the world what you think about our Defendpoint software.

Continue reading
Date published
1/24/2017 3:01:33 PM
Contributor:
James Maude

How proactive protection can eclipse Shamoon

In recent days, Saudi Arabia has warned organizations in the kingdom to be on the alert for the Shamoon computer virus, a variant of which gained notoriety after being linked to attacks against Saudi Aramco in 2012 and reportedly damaged over 30,000 systems.

Continue reading
  1. 1
  2. 2
  3. 3