aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
6/21/2017 1:29:22 PM
Contributor:
Ian Pitfield

Wham, bam thank you PAM

Many, if not all organizations that I work with have been on a PAM journey of some description – some successful, some not so much, but all have had considerable investment along the way. In this blog, I want to explore the value-add of PAM, its principles, and ultimately the security posture delivered by the approach.

Continue reading
Date published
2/8/2016 9:44:44 AM
Contributor:
Andrew Avanessian

Are admin rights the biggest threat to enterprise security?

Last week saw the launch of the latest Microsoft Vulnerabilities Report, Avecto’s leading research project into the security bulletins issued by the software giant over the past 12 months. Now in its third year, the report has consistently provided intriguing insight into today’s threat landscape, the common attack vectors and the products within the Microsoft portfolio that cause IT departments the most sleepless nights.

Continue reading
Date published
9/1/2015 10:34:45 AM
Contributor:
Paul Kenyon

Prevention is possible

No longer will historic methods of blocking and protection be the only tenets of a security strategy, focus will be on next generation technologies and also detection and response.

Continue reading
Date published
4/14/2015 7:33:41 AM
Contributor:
James Maude

The Mitigation Game

Following on from last year, Avecto have analyzed Microsoft vulnerabilities in 2014 to reveal how the removal of admin rights is more important than ever.

Continue reading