Remove the risk

Insider threats are a real threat in organizations where users have too much access to systems or data. Arguably the best known case of malicious insider attack is the NSA data breach, when contractor Edward Snowden obtained logins for a number of NSA employees in his role as systems administrator, and then leaked the agency secrets.

Removing admin rights is often cited as the single biggest improvement you can make in improving security, but balancing user freedom is a challenge that many businesses struggle to get right.

  • 0 % insider breaches took months or years to discover Verizon DBIR 2016
  • 0 % attacks are carried out by insiders IBM 2015
  • 0 % think IT admins pose biggest security threat Avecto research 2016

Swipe Left

Defendpoint stops the attack

Defendpoint uniquely combines three proactive capabilities to protect you from accidental or malicious insider threats. It allows you to follow industry best practices recommended by experts such as Gartner, Center for Internet Security and more by protecting the operating system and removing admin rights.

Privileges are assigned directly to applications, tasks and scripts and never to users. Contextual messages replace standard User Account Control prompts to improve communication. And you're protected from accidental misuse by isolating any web-based malware introduced into your environment.

Learn about Defendpoint's capabilities

Featured webinar

Expert webinar: The hacker's perspective

Watch this on demand webinar from ethical hacker and Microsoft MVP Sami Laiho as he reveals how and why admin rights are so often used to steal IP and data.

  • See how hackers can breach your defenses using the flaws in Windows technology
  • Learn how to build on native tools like UAC and Applocker to eliminate back door vulnerabilities
  • See how simple and smart security stops insider attacks
  • Practical advice and real demos from the hacker's perspective
Watch the webinar