Video Screencast Help

Search

Search results

Properly securing privileged accounts is a basic security tenet and often a priority for servers. Unfortunately, the same level of concern is not present for desktops in many organizations. Yet desktops\laptops often contain as much sensitive information ...
Blog Entry by stebro | 26 Jun 2013 | 0 comments
The first step to securing administrator access is knowing who has accounts and where. Using Arellia Local Security Solution , local administrator groups can be assessed for ...
Video by stebro | 09 May 2013 | 0 comments
When removing administrator rights, organizations run into issues of their end users needing to install software and\or make changes to the system. Using a privilege management tool, ...
Video by stebro | 08 Apr 2013 | 0 comments
In previous articles, we discussed why users want administrator rights and why they need them. Now let’s explore why they shouldn’t have them. In today’s increasingly dangerous threat landscape, every organization’s security strategy should include the ...
Blog Entry by stebro | 06 Mar 2013 | 0 comments
One of the challenges of having end users with local administrator rights is that they can stop and disable critical services such as the Symantec Management Agent. One option would ...
Video by stebro | 29 Oct 2012 | 0 comments
The Ponemon Institute’s 2012 Cost of Cyber Crime Study sponsored by HP has just been released with some very interesting data. The increasing costs found in this study would argue for additional protections beyond what most organizations are using. ...
Blog Entry by stebro | 11 Oct 2012 | 0 comments
Since publishing the article on Zero-Day Vulnerability Protection with Privilege Management , there has been a lot of additional press around the September 2012 Microsoft Internet Explorer vulnerability that adds additional insights into this ...
Blog Entry by stebro | 27 Sep 2012 | 0 comments
  Zero day vulnerabilities are common and circumvent traditional security technologies. See how the running user can protect a system and how Arellia Application Control Solution ...
Video by stebro | 24 Sep 2012 | 0 comments
Have you used Internet Explorer to visit a malicious website recently? Have you used Internet Explorer to visit any website lately? How do you know for sure that you are not infected? Yesterday, a new zero-day vulnerability for Internet Explorer versions ...
Blog Entry by stebro | 18 Sep 2012 | 0 comments
One of the first challenges an organization faces when deciding to remove end-user administrator rights is determining what applications require such rights. Many times the approach is to remove administrator rights, see who complains and add those users ...
Blog Entry by stebro | 21 Aug 2012 | 0 comments