Seven reports you can share with auditors and execs to demonstrate proactive privilege management

Seven reports you can share with auditors and execs to demonstrate proactive privilege management

All major compliance bodies recommend or require a least privilege policy to protect sensitive data. Removing local administrative access on user workstations is a fundamental strategy for endpoint security to protect against both internal and external threats. Auditors will see that you have implemented a proactive security strategy to prevent ... Read More
Microsoft’s Frankenstein Approach to Endpoint Protection

Microsoft’s Frankenstein Approach to Endpoint Protection

With Windows 10 Microsoft has embedded and enhanced a number of free tools it claims give IT and security teams the opportunity to close security gaps exposed in previous versions of Windows. One of the critical goals Microsoft aims to address is the principle of least privilege. Under a least ... Read More
Thycotic ACS App Control Swipe Action

How to Protect Your Desktop Team When Moving to Least Privilege 

When companies yank local administrative privileges from business users without considering the downstream impact, their least privilege programs are doomed to fail. Suddenly unable to download applications, run programs, install printers or make other system changes, users will be confused and frustrated. Those frustrations are going to land squarely on ... Read More
Top 10 Keys to Successful Least Privilege Adoption Via Application Control

Top 10 Keys to Successful Least Privilege Adoption Via Application Control

Gone are the days when a security team could select a new tool, turn it on, and expect everyone in the organization to adjust. When security hinders the business, the business fights back. Users now have numerous ways they can work around security tools and policies to get their job ... Read More
Why is least privilege the place to start for endpoint security?

Why is least privilege the place to start for endpoint security?

Because it will save you time and money. Your end user’s computers are increasingly exploited as an attack vector used to attain accounts with local administrator rights on Windows or root access on Mac OS. There are a lot of solutions that promise malware detection and prevention. And you can ... Read More