Nobody likes a spoil sport. Except for us.
Remember those famous hacking scenes from Hollywood blockbusters and classic TV series?
Well if only the various characters and organisations in the films and TV series below had UserLock and FileAudit.
Things would've turned out very differently...

Hollywood

Hollywood

 

Snowden

Dell employee, former CIA secret man and computer wizard Edward Snowden happily begins his life as a contractor for the NSA. But what's this? Edward doesn't like what he's seeing his government do, what with snooping on ordinary people and everything.

In his job he's given almost unlimited access to NSA data after persuading more than 20 people to give him their passwords for " administrator purposes".

Play

If only the NSA used FileAudit

— there's no way Snowden could've copied thousands of documents to an external hard drive without alerting someone automatically straight away.

And if the NSA used UserLock as well, employees would've ended up restricting their own access if they shared their passwords with Snowden. Why? Because UserLock denies concurrent logins.

Snowden's social engineering tactics would've been useless and the NSA's naughty activities would've stayed secret. No-one would've been the wiser...

Replay

 

Mr. Robot

While E Corp seems to have successfully covered up the Washington Township leak, employee Angela Moss has other ideas about exposing her employer.

Play

Angela’s run head first into UserLock.

Angela’s run head first into UserLock. She’s tried to log in using poor Joseph Green’s credentials after stealing them from an unattended machine via a “rubber ducky” USB. But E Corp’s IT department have enforced UserLock’s workstation restrictions so whilst Joseph’s stolen credentials may be valid they won’t work on Angela’s machine. Sorry Angela, access denied.

Even if there were no access restrictions, UserLock’s auditing and reports would’ve shown to any suspecting IT administrator that Angela opened a session from her computer with someone else’s credentials.

Good job E Corp decided to protect its incriminating Washington Township files otherwise the company would’ve landed itself in some serious hot water!

Replay

 

Casino Royale

After beating Le Chiffre in a high-stakes poker game, Bond is put through a kind of torture that no man would be willing go through — putting his balls on the line. Literally. All for the sake of keeping a password secure.

Play

If Bond was protected by UserLock,

he could've happily given up his password safe in the knowledge that access was restricted by other means, like time and location.

UserLock — putting an end to movie scenes that make every man cross his legs.

Replay

 

The Matrix Reloaded

Matrix-escapee, Nebuchadnezzar first mate, and brilliant hacker Trinity is tasked with destroying a power plant to prevent a security system being triggered.

Play

This type of power plant hack could have been prevented on an operating system that works with UserLock.

Bad luck Trinity, you're logging in from a strange laptop and location, both of which aren't approved by the power plant's IT department. So it doesn't matter if you're able to compromise the administrative password, UserLock's workstation and geographical restrictions will stop you from logging in to the network to disable the grid system.

Looks like the human race is doomed after all.

Replay

 

24

Intelligent, witty and beautiful, Nina Myers is one of the most helpful, caring and exceptional agents at Counter Terrorist Unit (CTU). But who does Myers really work for? In the finale of 24 season one, Jack Bauer’s wife Teri walks in on Nina transferring files from CTU...

Play

Ahhh...

but as part of its security plan, CTU implemented FileAudit just before the start of the first episode so when Bauer suspected that there was a mole in episode two, FileAudit backed up his suspicions of Myers and 24 would have been... well...2.

Replay

 

Independence day

It's Independence Day. The aliens are taking over. The human race places its future in the hands of David Levinson (played by the legendary Jeff Goldblum), an MIT-trained satellite technician. Levinson concocts an idea to defeat the aliens whereby he uploads a virus to the mothership to deactivate the force fields. What could possibly go wrong?

Play

Who'd've thunk it.

The aliens actually bought UserLock a few years ago, so despite Levinson's attempt to gain access to the mothership using a real alien spaceship, he did so at an IT-unapproved time of day, so he could never upload the virus.

Fast forward a few months, the human race has been wiped out and the aliens are enjoying piña coladas in the president's private pool. Unbelievable Jeff.

Replay

 

Sherlock

Now, Sherlock's a clever guy. He'll look you up and down and tell you your life story without even knowing you. But not even Sherlock would've been able to hack into Major Barrymore's computer in the Hounds of the Baskerville episode.

Play

How did UserLock do it?

Elementary my dear Watson. Major Barrymore had restricted access to certain times of day. He even received an alert to say someone was trying to log in using his real password.

I guess Sherlock's not going to find out exactly what's going on at Baskerville after all..

Replay

 

Wargames

No-one likes to be outsmarted by a kid. Especially when that kid nearly starts a war when he thinks he's only playing a computer game. If only the US government used UserLock to restrict access...

Play

Looks like the US government has restricted access to location,

so there's nothing poor little David Lightman can do sitting in his bedroom. Oh yeah, and he wouldn't have been able to hack into his school system to change his failed grades either.

World War III averted. Tough luck kid. Better luck next time.

Replay

 

Spooks

MI5 always seems to be plagued by moles, rogue agents and malicious insider threats. Here's an MI6 agent called Neil Sternin who's actually working for terrorists stealing data from an MI5 computer.

Play

Sorry mate, MI5 now uses FileAudit, so you can't copy loads of files to an external hard drive without alerting Malcolm in IT. Take that terrorists.

MI5 1 –0 Terrorists

Replay

 

So there you have it.
Hollywood and TV's finest have been thwarted.

While security breaches make for good entertainment in films and TV series,
you don't want those kind of breaches to happen to your organization.

So don't do what the films do —
protect your organization and strive for a much more uneventful life.

UserLock

Watch video

Guard against unwanted network access from both external attacks and malicious insiders using compromised Windows user logins. UserLock offers context-aware access controls, real-time monitoring and comprehensive auditing to reduce the risk of a security breach.

Learn more & Free trial

FileAudit

Watch video

Protect access to an organization's most sensitive files. FileAudit offers an easy yet robust tool for monitoring, auditing and alerting on all access and access attempts to files, folders and file shares that reside on Windows Systems.

Learn more & Free trial

 
Down