aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
10/19/2016 8:53:05 AM
Contributor:
James Maude

An ounce of prevention is worth a pound of cure

Gartner recently published “The Real Value of a Non-Signature-Based Anti-Malware Solution to Your Organization” providing insight into how non-signature approaches to malware prevention can not only prevent attacks but offer reduced footprints on the endpoint. As you would expect Avecto are mentioned as one of the vendors in this space.

Continue reading
Date published
3/14/2016 1:22:44 PM
Contributor:
Brian Hanrahan

Application authentication needs a reboot

Last week marked an exciting new first – ransomware on a Mac disclosed by Palo Alto who had seen it with a client. What’s simultaneously encouraging and disappointing is that it could have been prevented without detection using highly recommended best practices – application whitelisting.

Continue reading
Date published
1/20/2016 2:10:32 PM
Contributor:
James Maude

Endpoint vs. Network Security - who wins?

If you can contain or block threats before they hit the endpoint with network-based security such as detection and sandboxing,that is always a good idea. The problem is that if you don’t secure the endpoints first, you end up with an eggshell security stance, where you are reliant on a single outer shell to protect your data.

Continue reading
Date published
5/21/2014 11:27:48 AM
Contributor:
Andrew Avanessian

Caught between a rock and a hard place

At the recent InfoSec event in London, I talked about why removing admin rights is the one big thing you can do to immediately improve your security posture. But instead of being at the top of the agenda, it’s often neglected. Why?

Continue reading