Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Avecto launches its next generation Mac security solution

April 25, 2016

  • Blog
  • Archive

Endpoint security software firm Avecto has today announced the general release of Defendpoint for Mac, its next generation security solution to manage Macs in the enterprise.

Drawing on Avecto’s market-leading least privilege capabilities, Defendpoint for Mac finally allows organizations to gain the same level of security, control and usability on their OS X devices, that has been previously reserved for Windows-based devices.

With Defendpoint for Mac, users are able to achieve least privilege – allowing all users to operate as standard users and run admin tasks and privileged applications without the need for an admin account. The combination of Privilege Management and Application Control makes allow listing easy to achieve. Organizations can regain control of apps with pragmatic allow listing, ensuring that only known good applications are able to run, while users have the freedom and flexibility to perform everyday tasks.

The availability of Defendpoint for Mac comes as Macs and the OS X ecosystem become an increasingly popular target for hackers. In 2015 researchers at Symantec saw a monthly average of between 10,000 and 70,000 Mac computers infected with malware.[1]

Mark Austin, co-CEO and co-founder of Avecto said:

“Enterprise adoption of Macs is rising rapidly thanks in part to the consumerization of IT. Typically however these Mac devices are poorly managed, leaving organizations with no visibility of activity or user behaviour. Since we announced Defendpoint for Mac last year we’ve witnessed a significant uplift in Mac vulnerabilities and hackers increasingly finding new ways to bypass Apple’s native security features.

“For the first time, Defendpoint for Mac will bring OS X security in line with Windows, allowing organizations to regain control over their Mac estate, and enabling users to be both secure and productive. We’re excited to be able to provide our customers with a single solution across both Windows and Macs devices, and initial demand for the product has been overwhelming.”

[1] http://www.techproducts.com.ng/cyber-security-firms-predict-rise-in-attacks-on-apple-product-in-2016/

Kevin Franks, Marketing Communications Manager

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Solutions to the Qatar National Information Assurance Policy v2.0

Whitepapers

KuppingerCole Executive Review - BeyondTrust Endpoint Privilege Management

Webcasts

Tech Talk Tuesday: Managing Vendor Access

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.