Analytics
11/7/2012
02:30 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Avecto Launches Privilege Guard 3.6 With Windows 8 Compatibility And App Store Control

Software includes privileged application control based on download source

MANCHESTER, UNITED KINGDOM and BOSTON, MA: October 23, 2012- Avecto, the leader in Windows privilege management, today announced the release of Privilege Guard 3.6, the newest version of its award-winning solution. Version 3.6 introduces a number of powerful new features, including a challenge/response capability to easily authorize applications for remote users and the industry's first-ever application control capability based on download source. Available today, Privilege Guard 3.6 is compatible with the upcoming Windows 8 operating system and provides enterprise control over apps downloaded from the Windows Store.

Key New Features:

· Challenge/Response Authorization For Secure User Flexibility - Provides remote application authorization via secure, 8-digit challenge/response codes that enable one-off, session-based or permanent elevation of individual applications.

· Enterprise Control of Windows 8 Store Apps – Whitelisting, blacklisting and full auditing of apps that are installed or downloaded from the Windows Store, ensures corporate-approved, controlled user access to apps on Windows 8 desktops, laptops and tablets.

· Elevation of Apps Based on Download Source - Provides tracking and control of software and applications, based on their download source, enabling intelligent whitelisting, blacklisting and elevation of applications.

· New Enterprise Reporting - Offers the broadest range of dashboards and reports on applications, processes, users, endpoints and policies with detailed summaries and the ability to drilldown to granular specifics. Delivers reports in a refreshed, easy-to-read and intuitive style.

· Privilege Guard Activity Viewer for Advanced Insight - New advanced diagnostics and troubleshooting tool built on Windows Management Information (WMI) provides detailed analysis of executed applications and applied policies for any managed endpoint.

· Privileged Account Management to Prevent Rogue Accounts - Provides sophisticated protection against tampering and the creation of rogue privileged accounts via a new policy setting.

· Full Templates and Event Import Wizard for Simplified Policy Creation - Streamlines policy creation for standalone evaluations through to advanced policies for enterprise rollouts via a wide variety of templates. Plus, the all-new Event Import Wizard - integrated directly into the management console - provides a unified workflow that allows audit events to be directly used in the creation and refinement of policies.

"Enterprises are faced with unparalleled challenges and opportunities, if you consider how new operating systems, in particular Windows 8, can transform an enterprise's environment and user-driven movements, such as Bring-Your-Own-Device (BYOD)," said Mark Austin, co-founder and CTO of Avecto. "This rapid speed of change, coupled with a convergence of technologies, puts tremendous pressure on the enterprise to empower users with the flexibility they need to perform their jobs, without compromising network security. At Avecto, it's our mission to help the enterprise navigate through these market dynamics and ultimately strike the elusive balance between productivity and security. Privilege Guard 3.6 does this by taking privilege management to new heights, enabling far greater visibility and control over corporate desktops and tablets."

Resources

Visit Avecto's booth #108 at the McAfee Focus 12 Security Conference, from Oct. 22 – 24, for demos of Privilege Guard 3.6. as well as the McAfee ePO Edition of Privilege Guard.

Learn more about Avecto by visiting its website.

Connect with Avecto on its blog and on LinkedIn and Twitter

About Avecto

Avecto is the leader in Windows privilege management, helping organizations to deploy secure and compliant desktops and servers. With its award winning Privilege Guard technology, organizations can now empower all Windows based desktop and server users with the privileges they require to perform their roles, without compromising the integrity and security of their systems.

Customers of all sizes rely on Avecto to reduce operating expenses and strengthen security across their Windows based environments. Our mission is to enable our customers to lower operating costs and improve system security by implementing least privilege. Avecto is building a worldwide channel of partners and system integrators and is headquartered in Manchester, UK with key regional headquarters in Andover, MA and Munich, Germany.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-0889
Published: 2014-07-29
Multiple cross-site scripting (XSS) vulnerabilities in IBM Atlas Suite (aka Atlas Policy Suite), as used in Atlas eDiscovery Process Management through 6.0.3, Disposal and Governance Management for IT through 6.0.3, and Global Retention Policy and Schedule Management through 6.0.3, allow remote atta...

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3020
Published: 2014-07-29
install.sh in the Embedded WebSphere Application Server (eWAS) 7.0 before FP33 in IBM Tivoli Integrated Portal (TIP) 2.1 and 2.2 sets world-writable permissions for the installRoot directory tree, which allows local users to gain privileges via a Trojan horse program.

Best of the Web
Dark Reading Radio