Explore more publications!

Heimdal Claims Industry First with IASME-Aligned Cyber Essentials PEDM Mapping

COPENHAGEN, DENMARK, February 9, 2026 /EINPresswire.com/ -- Heimdal today announced it is the first vendor to publish an IASME Cyber Essentials aligned control mapping for Privilege Elevation and Delegation Management (PEDM), helping organisations evidence least privilege and stronger control over administrative access.

Privileged access remains one of the most exploited attack paths in modern incidents.
Recent UK ransomware incidents have disrupted critical services, including healthcare and national infrastructure. In many intrusions, attackers do not stop at initial access. They look for privileged rights to disable protections, move laterally, and take control. That is exactly why Cyber Essentials places such emphasis on admin access separation and least privilege controls that can be evidenced during assessment.

Heimdal PEDM is built to reduce that risk by removing standing admin rights and enabling just enough privilege only when needed, under policy, with traceable accountability.

The first to publish an IASME Cyber Essentials PEDM mapping

Heimdal is the first vendor to publish an IASME Cyber Essentials aligned control mapping for PEDM, setting out how privilege management supports Cyber Essentials expectations and what evidence can be produced to support assessment.

For organisations and MSPs, this closes a common gap: having policy intent, but struggling to evidence day to day enforcement across endpoints.



Turning Cyber Essentials into enforceable controls

Cyber Essentials has become a practical requirement for many organisations, particularly those working with public sector buyers and supply chains. It is also a growing commercial requirement for MSPs, who must help customers meet baseline standards without slowing down operations.

Heimdal PEDM supports this by helping organisations to:
• Remove local admin rights by default, while keeping teams productive
• Permit elevation only for approved applications, tasks, and time frames
• Apply just enough administration so users get what they need, not what attackers want
• Reduce misuse, persistence, and lateral movement
• Generate auditable records of privileged actions for compliance and governance

“Most breaches do not start with Hollywood hacking. They start with access, followed by privilege,” Morten Kjaersgaard, Founder and Chairman, Heimdal. “Cyber Essentials forces a basic question: who has admin rights, and why. Our answer is simple. Default to standard user, then grant just enough administration for the task, for the time needed, with proof. That is how you shut down the easiest breach path without slowing the business.”



Supporting the broader Cyber Essentials baseline

Privileged access is only one part of the Cyber Essentials baseline. Heimdal’s wider platform helps organisations strengthen related areas such as patching, malware protection, DNS threat prevention, ransomware defences, and centralised reporting, supporting a more complete security posture without tool sprawl.



Availability

The IASME Cyber Essentials aligned PEDM mapping and supporting PEDM capabilities are available now, including the new least privilege elevation flow.

This release also includes PEDM Cloud AV scanning and USB Management enhancements to improve allowlisting and tracking across environments.

To learn more, visit here or contact: Madalina Popovici (mpo@heimdalsecurity.com).

For channel partnership enquiries, contact: James Webb (jwe@heimdalsecurity.com).



About Heimdal

Heimdal provides a unified security and compliance platform spanning prevention, detection, access control, and reporting, helping organisations reduce operational overhead and strengthen control across the attack chain.

Daniel Mitchell
Heimdal Security
email us here
Visit us on social media:
LinkedIn
Facebook
YouTube
X

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.

Share us

on your social networks:
AGPs

Get the latest news on this topic.

SIGN UP FOR FREE TODAY

No Thanks

By signing to this email alert, you
agree to our Terms & Conditions