+1-800-492-3951 or +3188.8.131.52.20 (GMT+1)
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Reduce the risk of security breaches from the insider threat
Control system access, identify employees on the network, respond to suspicious activity & protect patient data with IS Decisions solutions. Read more
Strong access control measures, enforced unique user ID and enhanced access monitoring to the network and cardholder data with our solutions. Read more
Userlock and FileAudit can both help you address the requirements of SOX by allowing you to control and monitor system access and identity. Read more
UserLock and FileAudit protect the network, and sensitive information within, against unwanted access to help your business become ISO 27001 compliant. Read more
UserLock directly addresses two access control baselines of NIST 800-53, AC-9 Previous Logon (Access) Notification and AC-10 Concurrent Session Control. Read more
This guide looks at some of the key areas for HIPAA compliance and the NHS Security policies with relation to internal safeguards.
Check if you're compliant
Research and guidance on access security for PCI, SOX, GLBA and FCA regulations that safeguard sensitive financial and customer data.
Research and guidance on user security and information access compliance for FISMA, ISO 27001, DPA and Lexcel regulations.
Rather than blaming users for being human, start better protecting users’ authenticated access.
If you are implementing an insider threat program, here’s a 12 step guide to help ensure that it’s set for the future of internal security.
An alternative to complex, costly and disruptive multi-factor authentication
A report on the frustrations that IT managers face with multi-factor authentication and how to improve access security without impeding end users or disrupting existing infrastructure.
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
From Brutus to Snowden: A study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
Do your actions risk your employer's security? Prove it!
Play The Weakest Link - A User Security Game.
Free to play for any employee in any position, from any department.Help engage your users and reinforce their user security awareness.
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
Interacting with remote Windows systems is a daily task for IT professionals.
Everyone will agree that application deployment, remote server reboots, emergency updates, user session locking, etc. are tedious, time consuming chores without the help provided by efficient tools.
IS Decisions prides itself in building top notch solutions for IT pros. Our remote deployment and execution solution is called RemoteExec and here’s a comparison with Microsoft’s PsExec:
RemoteExec is an agentless software solution that allows IT pros to execute predefined remote actions through a graphical interface.
RemoteExec remotely installs applications, executes programs/scripts and updates files and folders on Windows systems throughout the network.
RemoteExec logs execution history and results allowing administrators to reload remote actions and generate reports.
RemoteExec was created in 2000 by IS Decisions and is in its 5th major version.
PsExec is a light-weight telnet-replacement freeware that lets IT pros execute processes on other Windows systems, complete with full interactivity for console applications, without having to manually install client software.
It was initially developed by Sysinternals, which is now owned by Microsoft.
The Sysinternals web site was created in 1996 by Mark Russinovich and Bryce Cogswell to host their system utilities and technical information.
RemoteExec has an intuitive, user-friendly GUI (tabbed interface, dockable windows) with predefined action types while PsExec is a command line tool only.
As an example, with RemoteExec, a Microsoft hotfix deployment will only require you to specify the hotfix path while PsExec will require determining every hotfix switch.
RemoteExec can also be used via the command line and be invoked by a script or any automation tool if needed.
RemoteExec uses fully multithreaded technology while PsExec performs remote executions on one computer at the time.
This can be extremely frustrating especially on large networks or when remote computers are unavailable.
RemoteExec comprehensively logs all remote executions (and their results) it performs and automatically generates graphical, printable reports, so you can relaunch them (or schedule a new try) if some of them happen to be unsuccessful.
PsExec only provides you with a console output and a return code.
The scheduler is integrated in RemoteExec. You can perform and manage remote executions and reports outside of business hours.
PsExec does not have any scheduling features. You will have to manually build and enter the command line expression into the Scheduler.
RemoteExec comes with a mini scanner allowing remote systems configuration information to be collected and used for conditional updating: OS version, OS level (server/workstation), Service Pack, Internet Explorer version, customizable registry key/value, OS language, architecture, etc.
This makes it possible to execute a deployment on Windows 7 SP1 workstations only, without having to select them manually.
There is no such possibility in PsExec.
RemoteExec gives you the ability to save Remote Action configurations in a favorite folder (My Remote Actions) in order to use them again quickly on different target computers (for example to perform on demand deployment).
PsExec will only allow you to save your command lines as a script file.
RemoteExec’s communications are encrypted. Unfortunately, when you use a specific user account, PsExec passes credentials in the clear to the remote workstation, thus exposing the credentials to anyone who happens to be «listening in».
PsExec is a smart unsupported utility that can be very useful if you are on a tight budget, manage a small-sized Windows network and have minimal feature and security requirements.
RemoteExec is a secure, feature-rich enterprise software solution that meets the performance and security requirements of savvy IT professionals managing small to very large (up to tens of thousands endpoints) Windows networks.
Share this page:
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.