Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Securing the server in today's threat landscape

October 20, 2017

  • Blog
  • Archive

We're often asked how Defendpoint works in a datacenter environment, how customers can achieve the same level of control over servers as they can with their endpoints.

When it comes to data breaches, servers represent one of the largest targets for both external and insider attacks. The risks around servers are often amplified by the fact that users login with highly privileged accounts.

From the Target data breach to Edward Snowden, it is clear that giving users carte blanche access with admin accounts can have serious repercussions. This puts organizations in a difficult position as the lack of granular controls built into Windows means that users require an admin account to perform even basic server tasks.

At Avecto we want to help you bridge this divide. We can help you remove admin accounts without limiting users. So many of the data breaches that dominate the news could have been mitigated with simple steps like Privilege Management and Application Control.

From rogue admins to nation state attackers, all have leveraged over privileged access to systems. If you can move to a position of least privilege, you automatically move to least risk as well. When this is combined with robust Application Control you are able to proactively defend against known and unknown threats attempting to add and run unwanted applications on your server. Defendpoint from Avecto is designed to make this as easy as possible to achieve.

Server benefits

Let's run through some of the key benefits Defendpoint can offer on Windows Servers:

Compliance - Many industries have compliance mandates to conform to, such as PCI-DSS and MAS. These follow industry best practise around controlling access to key systems usually by minimising the number of admin users. Defendpoint can help you achieve best practise and compliance without limiting any users' ability to perform their role.

3rd party access - One of the biggest threats to an organization is when 3rd parties require access to key systems. This is often necessary to perform maintenance or integrate systems. Defendpoint allows you control and monitor this access ensuring that only approved tasks or tools can be executed.

PowerShell - Defendpoint provides powerful remote PowerShell capabilities removing the need for admin accounts on the server to connect remotely. Combined with granular control over PowerShell commands users can log in and run commands from a standard user account without being able to interfere with services beyond their remit.

Maintenance windows - Defendpoint's granular controls can ensure that application updates and maintenance can only be performed at certain times ensuring the systems remain up during core business hours. This can be extended with WMI queries, for example ensuring application teams can only perform tasks on machines related to their application.

Content control - This allows standard users to edit files in protected locations without risking having to run tools with admin rights. A good example is when a user might need to edit a config file, this would normally require notepad to run with admin rights. This elevated notepad could then be abused to alter other files on the system. Defendpoint allows targeted access to content so users can edit files without introducing security risks.

Reduce risk - Admin users are often targeted in sophisticated spear phishing and social engineering campaigns. In the event that an Admin users credentials are compromised this introduces a huge risk to an organization. Defendpoint's position of least privilege and Application Control mitigates these risks and reduces your organizations attack surface.

These are just some of the benefits that can be quickly realised on your Windows Server estate. For more information on how prevention is possible contact our team today to arrange a demo.

James Maude

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.