Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Properly securing privileged accounts is a basic security tenet and often a priority for servers. Unfortunately, the same level of concern is not present for desktops in many ...
Blog Entry by stebro | 26 Jun 2013 | 0 comments
The first step to securing administrator access is knowing who has accounts and where. Using Arellia Local Security Solution , local administrator groups can be assessed for ...
Video by stebro | 09 May 2013 | 0 comments
When removing administrator rights, organizations run into issues of their end users needing to install software and\or make changes to the system. Using a privilege management tool, ...
Video by stebro | 08 Apr 2013 | 0 comments
In previous articles, we discussed why users want administrator rights and why they need them. Now let’s explore why they shouldn’t have them. In today’s increasingly dangerous ...
Blog Entry by stebro | 06 Mar 2013 | 0 comments
One of the challenges that organizations face when moving from Windows XP to Windows 7 or 8 is incompatible legacy applications. First there is the challenge of identifying which ...
Video by stebro | 30 Nov 2012 | 0 comments
One of the challenges related to critical applications on Windows desktops is end user’s or malware’s ability to kill critical services and processes. Critical applications in an ...
Blog Entry by stebro | 12 Nov 2012 | 0 comments
One of the challenges of having end users with local administrator rights is that they can stop and disable critical services such as the Symantec Management Agent. One option would ...
Video by stebro | 29 Oct 2012 | 0 comments
The Ponemon Institute’s 2012 Cost of Cyber Crime Study sponsored by HP has just been released with some very interesting data. The increasing costs found in this study would ...
Blog Entry by stebro | 11 Oct 2012 | 0 comments
Since publishing the article on Zero-Day Vulnerability Protection with Privilege Management , there has been a lot of additional press around the September 2012 Microsoft ...
Blog Entry by stebro | 27 Sep 2012 | 0 comments
Zero day vulnerabilities are common and circumvent traditional security technologies. See how the running user can protect a system and how Arellia Application Control Solution ( ...
Video by stebro | 24 Sep 2012 | 0 comments