IT security software

, , Comments Off on Majority of IT Pros don’t trust Biometrics for Corporate Security

Majority of IT Pros don’t trust Biometrics for Corporate Security

Majority of IT Pros don’t trust Biometrics for Corporate Security

Only a quarter of IT professionals believe that biometrics is the safest way to confirm identity in order to access corporate data, according to new research from IS Decisions. In fact, no individual technology wins a majority. Biometrics (23%) comes one place behind two-factor authentication (29%), and edged only slightly ahead of the humble old … Continued

, , Comments Off on File Monitoring Software Update. Much more than a file access log.

File Monitoring Software Update. Much more than a file access log.

File Monitoring Software Update. Much more than a file access log.

We are pleased to announce the release of an update to our file monitoring software solution – FileAudit. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems in real time. Free 30 Day Trial Download of FileAudit IT professionals can set up … Continued

, , , , Comments Off on How to make your school network secure from the inside

How to make your school network secure from the inside

How to make your school network secure from the inside

IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student life as school dinners. Every day, pupils up and down the country log on to … Continued

, , Comments Off on Enhanced network logon security

Enhanced network logon security

Enhanced network logon security

When thinking seriously about Windows network security, an absolute must for an organization is to create a well structured security policy. However, regardless of the best intention from management, gaining top to bottom commitment is difficult to the point of being nigh on impossible. Humans are the weakest link Research conducted by IS Decisions found … Continued

, , Comments Off on Monitor User Activity on Windows Server Network

Monitor User Activity on Windows Server Network

Monitor User Activity on Windows Server Network

Being able to audit and monitor user activity across a Windows Server based Network is key to knowing what is going on in your Windows environment. Monitoring user activity is vital in helping mitigate increasing insider threats, implement CERT best practices and get compliant. However it is important to stress that without enhanced user access … Continued

, , Comments Off on Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

A division from a well-known government law enforcement agency needed to better track the usage of sensitive files presented in the prosecution of major criminals.  The division deals with high profile cases such as murder, fraud and serial sexual assaults, serving over 1,000 employees including civilian members and police officers. Their work supports major investigations … Continued

, , , Comments Off on LimitLogin vs UserLock

LimitLogin vs UserLock

LimitLogin vs UserLock

This blog post reviews how LimitLogin and UserLock limit concurrent user logins in an Active Directory domain. It will focus on the concurrent connection restriction feature provided by each solution and discuss how else they help an organization secure user access for Windows Active Directory environments. LimitLogin LimitLogin is an unsupported tool that was released … Continued

, , , Comments Off on Extending Microsoft Active Directory Security in 2014 and beyond.

Extending Microsoft Active Directory Security in 2014 and beyond.

Extending Microsoft Active Directory Security in 2014 and beyond.

For many organizations Active Directory is just the starting point when it comes to identity management and controlling and recording what users can do. Active Directory provides basis user security. It can check that credentials supplied match stored user profiles and then open access to different resources. Once a user is authenticated however, organizations need to apply … Continued

Comments Off on Windows Active Directory Security with IS Decisions

Windows Active Directory Security with IS Decisions

Windows Active Directory Security with IS Decisions

Securing your Windows Active Directory infrastructure. Every day here at IS Decisions, we’re lucky to engage with individuals from all over the world. Security and emergency response truly are global issues. We speak with individuals from organizations, companies and government departments that recognize their security needs go beyond what’s available in native Windows controls. We speak … Continued

, Comments Off on IS Decisions: Home Grown and High Tech.

IS Decisions: Home Grown and High Tech.

IS Decisions: Home Grown and High Tech.

Home-grown and high-tech, IS Decisions continue to win renowned International clients such as The FBI, Barclays and the U.S. Department of Justice. IS Decisions featured on TV This TV report from LCI (a 24-hour French cable news network) focuses on how ‘this fast-growing company’ is intent on growing its International presence from its base in the … Continued

Secured By miniOrange