Analytics
11/7/2012
02:30 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Avecto Launches Privilege Guard 3.6 With Windows 8 Compatibility And App Store Control

Software includes privileged application control based on download source

MANCHESTER, UNITED KINGDOM and BOSTON, MA: October 23, 2012- Avecto, the leader in Windows privilege management, today announced the release of Privilege Guard 3.6, the newest version of its award-winning solution. Version 3.6 introduces a number of powerful new features, including a challenge/response capability to easily authorize applications for remote users and the industry's first-ever application control capability based on download source. Available today, Privilege Guard 3.6 is compatible with the upcoming Windows 8 operating system and provides enterprise control over apps downloaded from the Windows Store.

Key New Features:

· Challenge/Response Authorization For Secure User Flexibility - Provides remote application authorization via secure, 8-digit challenge/response codes that enable one-off, session-based or permanent elevation of individual applications.

· Enterprise Control of Windows 8 Store Apps – Whitelisting, blacklisting and full auditing of apps that are installed or downloaded from the Windows Store, ensures corporate-approved, controlled user access to apps on Windows 8 desktops, laptops and tablets.

· Elevation of Apps Based on Download Source - Provides tracking and control of software and applications, based on their download source, enabling intelligent whitelisting, blacklisting and elevation of applications.

· New Enterprise Reporting - Offers the broadest range of dashboards and reports on applications, processes, users, endpoints and policies with detailed summaries and the ability to drilldown to granular specifics. Delivers reports in a refreshed, easy-to-read and intuitive style.

· Privilege Guard Activity Viewer for Advanced Insight - New advanced diagnostics and troubleshooting tool built on Windows Management Information (WMI) provides detailed analysis of executed applications and applied policies for any managed endpoint.

· Privileged Account Management to Prevent Rogue Accounts - Provides sophisticated protection against tampering and the creation of rogue privileged accounts via a new policy setting.

· Full Templates and Event Import Wizard for Simplified Policy Creation - Streamlines policy creation for standalone evaluations through to advanced policies for enterprise rollouts via a wide variety of templates. Plus, the all-new Event Import Wizard - integrated directly into the management console - provides a unified workflow that allows audit events to be directly used in the creation and refinement of policies.

"Enterprises are faced with unparalleled challenges and opportunities, if you consider how new operating systems, in particular Windows 8, can transform an enterprise's environment and user-driven movements, such as Bring-Your-Own-Device (BYOD)," said Mark Austin, co-founder and CTO of Avecto. "This rapid speed of change, coupled with a convergence of technologies, puts tremendous pressure on the enterprise to empower users with the flexibility they need to perform their jobs, without compromising network security. At Avecto, it's our mission to help the enterprise navigate through these market dynamics and ultimately strike the elusive balance between productivity and security. Privilege Guard 3.6 does this by taking privilege management to new heights, enabling far greater visibility and control over corporate desktops and tablets."

Resources

Visit Avecto's booth #108 at the McAfee Focus 12 Security Conference, from Oct. 22 – 24, for demos of Privilege Guard 3.6. as well as the McAfee ePO Edition of Privilege Guard.

Learn more about Avecto by visiting its website.

Connect with Avecto on its blog and on LinkedIn and Twitter

About Avecto

Avecto is the leader in Windows privilege management, helping organizations to deploy secure and compliant desktops and servers. With its award winning Privilege Guard technology, organizations can now empower all Windows based desktop and server users with the privileges they require to perform their roles, without compromising the integrity and security of their systems.

Customers of all sizes rely on Avecto to reduce operating expenses and strengthen security across their Windows based environments. Our mission is to enable our customers to lower operating costs and improve system security by implementing least privilege. Avecto is building a worldwide channel of partners and system integrators and is headquartered in Manchester, UK with key regional headquarters in Andover, MA and Munich, Germany.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4725
Published: 2014-07-27
The MailPoet Newsletters (wysija-newsletters) plugin before 2.6.7 for WordPress allows remote attackers to bypass authentication and execute arbitrary PHP code by uploading a crafted theme using wp-admin/admin-post.php and accessing the theme in wp-content/uploads/wysija/themes/mailp/.

CVE-2014-4726
Published: 2014-07-27
Unspecified vulnerability in the MailPoet Newsletters (wysija-newsletters) plugin before 2.6.8 for WordPress has unspecified impact and attack vectors.

CVE-2014-2363
Published: 2014-07-26
Morpho Itemiser 3 8.17 has hardcoded administrative credentials, which makes it easier for remote attackers to obtain access via a login request.

CVE-2014-2625
Published: 2014-07-26
Directory traversal vulnerability in the storedNtxFile function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to read arbitrary files via crafted input, aka ZDI-CAN-2023.

CVE-2014-2626
Published: 2014-07-26
Directory traversal vulnerability in the toServerObject function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to create files, and consequently execute arbitrary code, via crafted input, aka ZDI-CAN-2024.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.