News, discussion and expertise on helping you to manage and secure your IT Infrastructure. Focused on solutions for Windows Networks and Active Directory.

IT Infrastructure

, , , , Comments Off on Are you Identifying and Monitoring End-Users Network and File Access?

Are you Identifying and Monitoring End-Users Network and File Access?

Are you Identifying and Monitoring End-Users Network and File Access?

Recent IS Decisions research among 1500 healthcare, finance, and legal sector workers in both the US and the UK highlighted the current status of how organizations are securing their networks and sensitive information within. The results shed light on how much more needs to be done to mitigate the risk of both security and compliance … Continued

, Comments Off on Information Security in Banking and the Insider Threat

Information Security in Banking and the Insider Threat

Information Security in Banking and the Insider Threat

The biggest threat for the banking sector is coming from within. How can a bank mitigate against the risk from malicious, careless or exploited users? This week saw U.S. law enforcement officials arrest five individuals who reportedly were involved in the high-profile 2014 security breach of JPMorgan. The breach was one of the largest attacks … Continued

Comments Off on Insider Threat Protection. People, Process and Technology

Insider Threat Protection. People, Process and Technology

Insider Threat Protection. People, Process and Technology

When it comes to protecting against the Insider Threat, too often overlooked (often critically) is how people and process should be set up to mitigate the risk from employee behavior. Such behavior that often causes or aides security breaches. The notion that IT security is a combination of people, process and technology is nothing new. The triangle … Continued

, Comments Off on Six steps to multi device security in the age of BYOD

Six steps to multi device security in the age of BYOD

Six steps to multi device security in the age of BYOD

The reason BYOD (bring your own device) causes concern for IT managers is it equates to a wider base of devices gaining access to network resource, often devices outside of the IT department’s control. We know that employees are frequently requesting to be able to use their own devices for work, and the practice is … Continued

, , , , Comments Off on How to make your school network secure from the inside

How to make your school network secure from the inside

How to make your school network secure from the inside

IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student life as school dinners. Every day, pupils up and down the country log on to … Continued

Comments Off on Windows Active Directory Security with IS Decisions

Windows Active Directory Security with IS Decisions

Windows Active Directory Security with IS Decisions

Securing your Windows Active Directory infrastructure. Every day here at IS Decisions, we’re lucky to engage with individuals from all over the world. Security and emergency response truly are global issues. We speak with individuals from organizations, companies and government departments that recognize their security needs go beyond what’s available in native Windows controls. We speak … Continued

, , , , , Comments Off on Securing Authorized User Access on Windows Networks

Securing Authorized User Access on Windows Networks

Securing Authorized User Access on Windows Networks

How can organizations safeguard and secure their Windows infrastructure to mitigate insider threat, ensure regulatory compliance and respond to IT emergencies? Rahul Bhatt is a Security Consultant at LOGON Software Asia Limited, a leading independent supplier of security software to the Asian IT communities for over 10 years.   IT administrators spend a lot of … Continued

Comments Off on BYOD Security for Windows Networks

BYOD Security for Windows Networks

BYOD Security for Windows Networks

BYOD security is a concern for many IT departments. Because of this, UserLock includes a Wi-Fi and VPN session control feature that permits an organization to control their wireless networks and help secure BYOD environments. With UserLock an organization can monitor, restrict and record every Wi-Fi and/or VPN session. How to restrict Wi-Fi & VPN sessions … Continued

, Comments Off on PowerShell Commands for Active Directory Security

PowerShell Commands for Active Directory Security

PowerShell Commands for Active Directory Security

With the release of UserLock 7 comes PowerShell commands for Active Directory Security. Yes, it is now possible to manage/administer UserLock with PowerShell cmdlets! UserLock is an enterprise software solution that controls and restricts user access offering Identity and Access Management to Windows and Active Directory networks. Gaining in popularity and importance, Windows PowerShell is … Continued

, Comments Off on Microsoft Certified Security Software for Windows Networks

Microsoft Certified Security Software for Windows Networks

Microsoft Certified Security Software for Windows Networks

Committed to developing unique security software for windows networks, we are once again delighted to have renewed our Microsoft Certified Partner status and Silver Application Development (formerly ISV Independent Software Vendor). It takes more than just the ordinary to achieve certified status. On renewing we have again demonstrated our expertise with Microsoft technologies and proven our ability to meet … Continued

Secured By miniOrange