+1-800-492-3951 or +3188.8.131.52.20 (GMT+1)
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Reduce the risk of security breaches from the insider threat
If you are implementing an insider threat program, here’s a 12 step guide to help ensure that it’s set for the future of internal security.
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
From Brutus to Snowden: A study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
Do your actions risk your employer's security? Prove it!
Play The Weakest Link - A User Security Game.
Free to play for any employee in any position, from any department.Help engage your users and reinforce their user security awareness.
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
includes alerts for bulk file copying, mass deletion or movement and IP address tracking.
This is not an exercise in speculative future gazing.
We have asked 500 IT decision makers what their immediate plans are to best mitigate the risk of insider threats, and what they want to see from the wider industry, their peers and their seniors, now.
Download the report
This report is not about case studies, or an in depth look into any of these organisations’ security strategies.
It is a rare opportunity to get insight into the views and opinions of your peers on the topic of insider threat.
Based on independant research conducted with 1,000 desk workers in the US and 1,000 more in the UK, this report delves into how perceptions, attitudes and behaviour with regards to security in the workplace differ across demographics, job roles and industries.
IS Decisions, founded in 2000 and based in Biarritz (France), is a Software Vendor specializing in Infrastructure and Security Management solutions for Microsoft Windows.
Lines of code
Liters of coffee
Countries operated in
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.