The Effects of Windows 7 UAC on Enterprise Security

Eliminate Admin Rights from all Laptop Users
Eliminate Admin Rights from all Laptop Users

Click here to register

The Effects of Windows 7 UAC on Enterprise Security

The most anticipated and misunderstood change in Windows 7 is User Account Control (UAC). Microsoft introduced UAC in Windows Vista to eliminate the need for users to run with administrative privileges. Despite its good intentions, Vista's UAC was widely criticized for its frequent user prompting for routine applications and installations and its inability to remove the need for users to run as local Administrator.

In Windows 7, Microsoft introduces new UAC controls to address UACs' shortcomings in Vista. Rumors and suggestions have lead to enterprises thinking that UAC in Windows 7 will fix all the issues that were raised in Vista. Unfortunately, this is not the case. Enterprises must be aware of the new UAC options and the fact that if not configured properly or used correctly these features can become a security issue.

Join us to understand exactly what UAC is and the changes that have been made to it in Windows 7.

Featured speaker:
Derek Melber,
MCSE and Microsoft Group Policy MVP, BeyondTrust

Sponsored by

BeyondTrust is the only provider of Privileged Access Lifecycle Management (PALM) solutions for heterogeneous IT environments. BeyondTrust Privilege Manager was the first product to enable the security best practice of Least Privilege in Windows environments by allowing administrators to assign end-users permissions for required or selected applications. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. BeyondTrust customers include eight of the world's 10 largest banks, seven of the world's 10 largest aerospace and defense firms, and six of the 10 largest U.S. pharmaceutical companies, as well as renowned universities.

close

Next Article in Vendor Webcasts

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...