Please complete the form below to access the webcasts.
All fields are required.
Living the "un-healthy" Admin lifestyle can be risky. The good news is that the Group Policy fruits and vegetables are succulent and easy to digest!
Use the cornucopia of goodness that Group Policy has to offer to tackle desktop security management issues, Administrative accounts and specify what users can and cannot do.
In this talk, noted Group Policy expert and Group Policy MVP Jeremy Moskowitz will describe some "in the box" ways to make your world more secure, using tools you already have, such as AppLocker and BitLocker.
Learn what Group Policy can and cannot do on its own to manage desktop security and user and administrative rights challenges. As a compliment, you'll also see a demo of the Viewfinity product that manages administrator privileges and manages, customizes and/or suppresses UAC prompts and dialog boxes.
Group Policy provides the bounty - take advantage of the harvest !
IT professionals agree that removing admin rights is a smart practice for reducing security risks, and yet they know there has got to be a better way to deal with the productivity disruptions. The last thing they need is to implement a policy that creates more IT help desk tickets! We've drastically improved our product to take the burden off you by automating the steps to setup policies to manage privileges - all done behind the scenes without interrupting end users.
Viewfinity Privilege Management provides a new, automated approach for managing rights and privileges on Windows endpoints and servers. Viewfinity's intelligent automation identifies commonly needed privileges across the entire user base and automatically aggregates privilege needs, then creates a single policy for a collective group of users. This containment of policy proliferation results in enormous savings.
Listen to this webinar to learn how our user-friendly Windows Outlook style folders organize and manage policies that:
Windows 7 migrations are in full swing or completed. As part of this desktop refresh, many companies have removed local administrative rights on the endpoint and are using the Windows 7 built-in security features. Have these met your expectations? Are your end users calling IT support to get assistance with prompts for UAC passwords?
Darren Mar-Elia, Microsoft Group Policy MVP, walks us through the components of the Windows built-in security features and in which situations they work the best. He'll also introduce other methods for enhancing endpoint security within Windows 7 as related to managing UAC dialog boxes and best practices for managing administrator rights.
Next, Viewfinity demonstrates how to suppress the UAC dialog box and manage rights and privileges on Windows endpoints and servers. Using a fully automated process to identify common privilege needs across the entire user base, you can aggregate privilege needs and create a single policy for a collective group of users. No longer will the removal of administrator rights be disruptive to your end users or a burden on IT.
Removing admin rights is a smart practice for reducing security risks but there has got to be a better way to deal with the productivity disruptions. We've drastically improved our product to take the burden off you by automating many of the steps needed to setup policies to manage privileges.
Attend this 30 minute demo and learn how our new product release leverages Group Policy to elevate privileges for standard users. We'll review all the improvements designed to automate privilege elevation needs, starting with our user-friendly Windows Outlook style folders, integrated directly within Group Policy, that organize and manage policies to:
In the fight against security breaches, removing administrator rights from users has proven to be a well-accepted strategy. In fact, most organizations have already taken the step of removing administrative privileges throughout their IT infrastructure. However, this fundamental action is soon followed by the IT staff "temporarily" granting rights to users who need them in order to meet a specific business need. Over time, this uncontrolled privilege creep makes it difficult to keep track of where and why administrator rights have been applied and left open, leaving the organization at risk of misuse and abuse of these privileges.
Managing administrative rights is not a set-it-and-forget activity. At a minimum, the use of these higher-level privileges should always be proactively managed and routinely audited. Privileges should be handled very judiciously and granted at a granular level based on the specific business need. For example, it's almost always overkill to grant a user full admin rights to the entire system just so they can access a web application outside of the SSL-VPN.
IT security and operations managers will find that this webinar presents a set of best practice methods which allows them to quickly and easily manage and mitigate privilege creep. Some of the topics to be discussed are:
One of a law firm's greatest assets - its reputation - can easily be threatened by the possibility of an IT security breach that ruins a deal or embarrasses a client. Unfortunately this is a real threat - law firms have indeed lost clients or damaged their client relationships as a result of digital security breaches such as email misuse, undetected computer viruses or hackers.
Sean Power, Lathrop & Gage's CIO, will present how his firm is transitioning its desktop environment toward a locked down, least privileges operation. Of primary concern was the ability to be able to support the numerous attorneys who work at various off-site locations, from courthouses, client sites, branch offices, and other remote areas.
Security breaches are driving the need to manage and audit privileged accounts, all the way from the "gate-keeper" via password management control, through to the specific privileges via least privilege management principle.
When Lieberman Software's Enterprise Random Password Manager™ (ERPM) is used in combination with Viewfinity's Privilege Management solution, the two proven technologies offer flexible capabilities to granularly pick and choose the appropriate Privileged Identity Management controls and permission policies based on the platform (desktop, laptop, and server) for which the privileges are being managed. Joint customers benefit from the most comprehensive solution available for tracking and auditing all privileged and administrative activities and elevated privilege policies across an organization's entire infrastructure, from Windows-based endpoints, to servers, virtual machines, cloud/SaaS, remote based-endpoints and any other system within the organization.
In this joint webinar, we will provide a live demonstration detailing how the two products work together to protect companies who require fully automated password management and privileged account auditing along with elevation of privileges for applications or to reduce permissions for privileged users on specific applications and tasks in a least privilege environment.
In this webcast, Brian Grinstead, Support and Systems Management Coordinator for Indian Prairie School District 204 , shares how he is managing administrative rights on 7000 desktops and 2500 laptops spread over 35 locations. Brian will describe how he manages privileges for standard users that are located in remote offices as well as on-site using Viewfinity. Brian managed this transition without negatively impacting end user productivity. He describes his challenges and how the Viewfinity Solution improved Indian Prairie's endpoint security.
Included in this webcast is a demonstration of the Viewfinity product. Learn how IT administrators can manage and assign administrative privilege permissions to specific applications and desktop functions through granular control of administrator rights.
To more effectively combat security breaches, removing administrative rights from users is a well-accepted strategy. In fact, for most of you, your IT staff has already done so only to turn around and “temporarily” grant rights to users who end up needing them for a specific usage. The number of users creeps up and up, until you no longer can keep track of who you gave rights to. So what are top 5 risks this opens your company up to?
Attend this webinar and learn more about understanding the risks your environment is exposed to, such as:
We’ll teach you how to find local admin user accounts that are not being audited by your IT department, and how to create an audit trail of activities conducted after non-admin users enter the password on the UAC prompt. At the conclusion of this webcast you’ll be able to get a handle on who has administrator rights and remove the rights without disrupting productivity or increasing calls to your help desk. Takeaway: you will learn methods allowing you to stop giving users admin rights!
With the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing. This has prompted organizations to re-assess their approach to securing and managing desktops. Users who are "Administrators" on their endpoints often do not need absolute admin rights to accomplish their daily tasks - yet having free reign on software installation and endpoint based operations often leads to malware and data breaches that are costly to your company's reputation and bottom line.
With the advanced privilege management capabilities from Viewfinity, locking down desktops and operating a least privileges environment offers a fundamental layer of IT security as an effective means to mitigate endpoint-based risks.
On this webinar, Alex Shteynberg, Technology Architect in the New York City Microsoft Technology Center will discuss reasons why the desktop refresh fits perfectly into a Windows 7 migration project for securing and managing endpoints.
Ryan Kane, Systems Engineer for EagleMed, explained how he has locked down EagleMed's machines to prevent the sharing of patient data (HIPAA mandate) and mitigates the security risks introduced through malware. Ryan has managed this project such that he is enforcing least privileges without having a negative impact on user productivity. He described his challenges and how the Viewfinity Solution helped him resolve these obstacles.
Bob Vogt, Sr. Support Engineer with Viewfinity will then provide a demonstration showing how IT administrators can manage and assign administrative privilege permissions to specific applications and desktop functions through granular control of administrator rights.
In this joint webinar, Alex Shoykhet, VP of Product Management at Viewfinity and Jeremy Moskowitz, founder of PolicyPak discuss methods for achieving granular endpoint protection via application control. Then, and in real-time collaboration, they each demonstrate, on the same endpoint, how the Viewfinity product, using Microsoft Active Directory and Group Policy, manages administrator rights for standard users and how PolicyPak prevents users from manipulating important settings by locking down individual applications and controlling settings within the application.
Learn more about moving to a least privileges environment through practical examples lead by guest speaker Dr. Chenxi Wang, Vice President and Principal Analyst at Forrester Research and Leonid Shtilman, CEO and co-founder of Viewfinity.
In this 35 minute live demo session, you'll learn how to discover user accounts and groups that are members of the local “Administrators” built-in user group on computers in your Windows domain. Once the analysis has been run, we'll show you how to can take action, if needed, by removing the users or suspicious groups from the Administrators group.
Once the administrative rights have been removed, we'll show you how to manage and assign administrative privilege permissions to specific applications and desktop functions through granular control of administrator rights. We'll present a flexible approach that addresses the entire scope of how you can remove admin rights without sacrificing user productivity or increasing support call volume, including how to:
With the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing. This has prompted most organizations to also re-assess their approach to PC lockdown.
This webinar discusses how Viewfinity Privilege Management allows IT professionals to implement a governance program enabling IT to manage locked down PCs without sacrificing user productivity or increasing support call volume. We will demonstrate a flexible approach that addresses the entire scope of how you can manage your locked down environment, including how to:
You already know that handing out Administrator Rights simply isn’t a good idea. There’s got to be a better way! With the right solution, there is. You can eliminate Administrator Rights, while still enabling your users to perform the granular actions they need. Learn about the Viewfinity solution and best practices for implementation in this exciting webinar. We’ll introduce a new way of distributing permissions and you’ll take away some real-world examples on how to eliminate administrator rights without causing user productivity issues or an increase in support calls.
If you want to eliminate administrator rights, then this 35 minute presentation will give you the information you need to get started.
Chuck McAllister, Senior Sales Engineer, will demonstrate the following Viewfinity Privilege Management features:
All organizations agree that locking down desktops allows IT to control and protect
the entire distributed desktop environment. This practice reduces system vulnerability
by allowing end users to use only the applications and desktop functions that are deemed safe.
However, to be a worthy business policy, lockdown must support true cost savings not just adhere
to corporate compliance policies. We will demonstrate that if lockdown is done properly, and in
conjunction with a tool that will helps you manage privileges, the impact on productivity should
be nil and end users should have the ability to conduct business
as usual without jeopardizing your network.
In this webcast, you'll learn how to manage and assign administrative privilege permissions
to specific applications and desktop functions through granular control of administrator rights.
We'll present a flexible approach that addresses the entire scope of how you can lock down
your environment without sacrificing user
productivity or increasing support call volume, including how to:
With the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing.
With the advanced privilege management capabilities offered by Viewfinity, enterprises
have an alternative to the “all or nothing” approach to least privileges.
Managing the mobile user is quickly becoming the number one pain point in desktop management,
and is a challenge that continues to escalate. Most IT professionals are struggling for a better
method for locking down remote
PCs without impacting productivity or increasing help desk calls.
Viewfinity offers true native remote privilege management capabilities with absolute network independence;
there is no reliance on corporate network connectivity or VPN. All privilege management is done through a
secure and encrypted HTTPS connection. Our Privilege Management features are integrated with Active
Directory however, Viewfinity does not require laptops or desktops to be part of the Active Directory
domain or to be directly connected to the corporate network in order to activate policies that manage
administrator privileges. As soon as the PC connects to the internet, Viewfinity delivers the policies and
rules established by the IT Administrator. Once delivered, all policies
continue to be enforced even while working offline.
Martin Silverman, Director of IT for EvensonBest, will share how he is using
Viewfinity to manage endpoints for his
increasingly mobile workforce. He will discuss:
The following Viewfinity Privilege Management features will be discussed:
The US Government Configuration Baseline (USGCB/FDCC) mandate stipulates that administrative
rights cannot be granted to end users and may not be made available on federal desktops and laptops.
To achieve USGCB/FDCC compliance, a least privileges environment must be implemented. However, certain
Windows applications and desktop functions require local administrative privileges in order to run and
function properly on a desktop or laptop. Attend this webcast and learn how to resolve the administrative
privileges problem by supporting a locked down least privileges
environment without jeopardizing your network.
Carter Raines, Director of Technology with PrepFire Solutions, will discuss the USGCB/FDCC mandate and
PC Lockdown. PrepFire is a Service Disabled Veteran Owned Small Business (SDVOSB) that has
been providing technology solutions to government organizations and has built a reputation
for understanding that a solution is more than just a set of technical tasks. They have hands-on
experience and knowledge related to how government agencies can successfully implement technology to
meet their compliance goals. Carter will explore the various methods to be considered to protect and
control your desktops as related to USGCB/FDCC while
also understanding the impact on the end user community.
The webcast will conclude with Viewfinity’s VP of Product Management, Alex Shoykhet, presenting a
flexible approach to privilege management that addresses the entire scope of how you can lock down
your environment without creating unnecessary restrictions on the end user. He will demonstrate how
to manage administrative privilege permissions for specific
applications and desktop functions on locked down endpoints.