aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days


Microsoft Vulnerabilities Report 2016

For the fourth consecutive year, we've analyzed the findings of the known vulnerabilities published by Microsoft.

The 2016 report takes an in-depth look at the vulnerabilities affecting Windows, Office, browsers Windows Server and more - highlighting the clear case for admin rights removal in the enterprise as part of a proactive approach to endpoint security.

Download the report


Filter By Type

Filter By Category


Achieving Defense Federal Acquisition Regulation Supplement (DFARS) compliance

Read this article to find out how Avecto’s Defendpoint software secures your endpoints through integrated privilege management and application control…


The one big thing you can to mitigate cyber attacks

This article reveals why Privilege Management is the one big thing you can do today, to immediately prevent cyber attacks and empower your users with …


Defendpoint: Real-world healthcare breach analysis

This bitesize article analyzes a recent healthcare ransomware attack and discusses how Defendpoint can proactively immunize endpoints against a broad …


Optimize your endpoint protection strategy with Avecto & McAfee

In this short article, we share tips for optimizing your endpoint protection strategy with Avecto’s Defendpoint technology integrated with McAfee.


Application control datasheet

Defendpoint application control solves the traditionally difficult challenge of managing business applications. Download this application control data…


Privilege management datasheet

Privilege management assigns privileges to individual applications, tasks and scripts, never to users. Download this privilege management datasheet to…


The CIS Critical Security Controls

Introduced in 2008 in response to extreme data losses in the US, the 20 Critical Security Controls prioritizes a list of measures that are effective i…


McAfee + Avecto solutions brief

Discover how Defendpoint integrates with McAfee ePO to provide security strength and depth, offering robust protection against advance threats on the …


Defendpoint iC3 datasheet

Find out more about our Intelligent Communication, Coordination and Control (iC3) cloud-based platform for Defendpoint with our datasheet.