NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Demos
    • Glossary
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

Avecto strikes the balance between security and freedom with the launch of Defendpoint

October 27, 2014

  • Blog
  • Archive

Security software company Avecto has today extended its security offering with the launch of its proactive endpoint security suite, Defendpoint.

The innovative software positively empowers users to be creative, productive and profitable while protecting businesses from evolving cyber threats.

Defendpoint builds on Avecto's foundations in privilege management; with three distinct modules that run through a single agent, providing defense in depth to complement existing patching and antimalware strategies:

  • Privilege management - assigns privileges to applications, not users, enabling the successful removal of admin rights to protect the operating system. With this flexible approach, individuals can still access the applications, tasks and scripts they need to perform their job roles so that they can be productive without compromising security. Privilege management mitigates the risks associated with 92% of critical Microsoft vulnerabilities.
  • Application control - By taking control of your software environment and applying simple rules to manage trusted applications, you automatically reduce risk by blocking the unknown. Application control is so effective that experts analyzing real-world data, including The Council on Cyber Security (in association with SANS), name it the most essential strategy for mitigating cyber threats.
  • Sandboxing – extends security coverage to the most common entry point for malware and hackers - the internet. Unlike traditional sandboxing solutions that focus on building barricades, Defendpoint takes a unique approach to isolating content. Leveraging the native Windows security model, all untrusted activity runs inside a secure container.

By uniquely combining these three proactive technologies, enterprises will be able to effectively defend against unknown threats, without sacrificing user freedoms.

The introduction of sandboxing as part of the Defendpoint suite reinforces Avecto's security credentials, while adding another line of defense against increasingly sophisticated cyber threats.

Mark Austin, CEO at Avecto said: "The reason that many security projects fail is because they don't champion the user. If a security solution is inflexible or employees can't do their jobs effectively then it won’t be sustainable."

"As a young and agile company we see IT security differently. We firmly believe that security should be an enabler. With Defendpoint we have built a security solution that is focussed on the end user, ensuring the experience for employees is a positive one. At the same time we have integrated closely with existing infrastructures to provide a highly scalable solution that is easy to manage and maintain."

Avecto has witnessed significant growth since its inception in 2008 and is currently ranked as the fastest growing software company in the UK, according to Deloitte's Fast 50 list.

Defendpoint is set to make a huge impact on the security market with a global launch at events including McAfee FOCUS in Las Vegas, Gartner Symposium ITXpo in Barcelona and events in Melbourne, Boston, Sydney, Manchester and London.

About Avecto

Avecto is a security software company that sees security as an enabler. We're all about finding technical solutions aligned with commercial benefits. We know, from experience, that technology has the power to facilitate transformational change.

Our proactive endpoint security software Defendpoint delivers on this promise by uniquely combining the technologies of Privilege Management, Application Control and Sandboxing. The benefits of Defendpoint and our consultative methodology provides clients with a clearly mapped journey against measurable objectives to ensure project success.

And our focus on the end user means you can finally empower people to work freely without compromising security. So, with this positive approach, endpoint security can be the startpoint of freedom.

Kevin Franks, Marketing Communications Manager

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Microsoft Vulnerabilities Report 2022

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Privileged Access Management: PAM Checklist

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Podcast
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.