aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days

Resources

Microsoft Vulnerabilities Report 2016

For the fourth consecutive year, we've analyzed the findings of the known vulnerabilities published by Microsoft.

The 2016 report takes an in-depth look at the vulnerabilities affecting Windows, Office, browsers Windows Server and more - highlighting the clear case for admin rights removal in the enterprise as part of a proactive approach to endpoint security.

Download the report

Filters

Filter By Type

Filter By Category

Articles

Achieving Defense Federal Acquisition Regulation Supplement (DFARS) compliance

Read this article to find out how Avecto’s Defendpoint software secures your endpoints through integrated privilege management and application control…

Articles

The one big thing you can to mitigate cyber attacks

This article reveals why Privilege Management is the one big thing you can do today, to immediately prevent cyber attacks and empower your users with …

Articles

Defendpoint: Real-world healthcare breach analysis

This bitesize article analyzes a recent healthcare ransomware attack and discusses how Defendpoint can proactively immunize endpoints against a broad …

Articles

Optimize your endpoint protection strategy with Avecto & McAfee

In this short article, we share tips for optimizing your endpoint protection strategy with Avecto’s Defendpoint technology integrated with McAfee.

Datasheets

Application control datasheet

Defendpoint application control solves the traditionally difficult challenge of managing business applications. Download this application control data…

Datasheets

Privilege management datasheet

Privilege management assigns privileges to individual applications, tasks and scripts, never to users. Download this privilege management datasheet to…

Datasheets

The CIS Critical Security Controls

Introduced in 2008 in response to extreme data losses in the US, the 20 Critical Security Controls prioritizes a list of measures that are effective i…

Datasheets

McAfee + Avecto solutions brief

Discover how Defendpoint integrates with McAfee ePO to provide security strength and depth, offering robust protection against advance threats on the …

Datasheets

Defendpoint iC3 datasheet

Find out more about our Intelligent Communication, Coordination and Control (iC3) cloud-based platform for Defendpoint with our datasheet.