+1-800-492-3951 or +3184.108.40.206.20 (GMT+1)
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Reduce the risk of security breaches from the insider threat
Control system access, identify employees on the network, respond to suspicious activity & protect patient data with IS Decisions solutions. Read more
Strong access control measures, enforced unique user ID and enhanced access monitoring to the network and cardholder data with our solutions. Read more
Userlock and FileAudit can both help you address the requirements of SOX by allowing you to control and monitor system access and identity. Read more
UserLock and FileAudit protect the network, and sensitive information within, against unwanted access to help your business become ISO 27001 compliant. Read more
UserLock directly addresses two access control baselines of NIST 800-53, AC-9 Previous Logon (Access) Notification and AC-10 Concurrent Session Control. Read more
This guide looks at some of the key areas for HIPAA compliance and the NHS Security policies with relation to internal safeguards.
Check if you're compliant
Research and guidance on access security for PCI, SOX, GLBA and FCA regulations that safeguard sensitive financial and customer data.
Research and guidance on user security and information access compliance for FISMA, ISO 27001, DPA and Lexcel regulations.
Rather than blaming users for being human, start better protecting users’ authenticated access.
If you are implementing an insider threat program, here’s a 12 step guide to help ensure that it’s set for the future of internal security.
An alternative to complex, costly and disruptive multi-factor authentication
A report on the frustrations that IT managers face with multi-factor authentication and how to improve access security without impeding end users or disrupting existing infrastructure.
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
A Study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
ISO 27001/2 Compliance - Information access and user security
Learn about the requirements of ISO 27001 and ISO 27002 compliance with regards to user security and information access and where organizations could be doing better today.
Do your actions risk your employer's security? Prove it!
Play The Weakest Link - A User Security Game.
Free to play for any employee in any position, from any department.Help engage your users and reinforce their user security awareness.
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
The example below illustrates the use of a predefined System Action to ensure the automatic shutdown of all workstations. The time you choose for switching off your computer must coincide with your company business needs.
Take note that:
Our goal in this example is to shutdown all computers, even those with documents unsaved or applications running. You should communicate this as part of your global Green Charter to your users.
Open RemoteExec and go to Remote Jobs/New Remote Job/System action through the Configuration tree.
In the first section «Settings», choose in the combo list System action named Shutdown.
RemoteExec can check if a user is currently working on the target machine, and can process the System action differently in this case.
Choosing the option Immediate execution, notify otherwise means:
Notification modeTwo options to define how the shutdown will be initiated:
As we defined in the preamble, we want to shutdown all workstations. We will choose here to execute this System action after the Notification period. We will set a sufficient delay allowing users to finish their current work.
Leave the third combo list on the Don’t wait for the end of the execution option. (This option is pertinent in multi action mode, not in our example here).
Check the Force applications to close option.
We will be sure that all sessions kept opened will be closed. Although users have been informed about this Green Charter action, there will be always some thoughtlessness.
Set your Notification message to explain the imminent shutdown and provide instruction to avoid losing documents/work recently modified.
We want to power off all workstation from our network. That’s why in Target Computers section we have selected the whole domain. As we don’t want servers to be concerned by this Remote Action, we will set the Filter section option named OS level only to workstation.
The remote shutdown job is now ready and fully set.
This is how the Notification will be displayed to users connected on the target machines:
Click in Quick Access Pane on
Enter a name on the Schedule Wizard for this new task.
Once validating the new task name, the Windows scheduler pop-up will appear. Set the task to Daily and the hour settings in according to your company hours. Validate by clicking OK. You will be prompted to set an administrative account for this task.
In this example setting 09h30 PM means that the computers will be powered off by 10:00 at the latest. (9h30 + 30 minutes countdown).
The RemoteExec Scheduler now displays our new scheduled Job.
In this example, all computers have been shut down during the night. In the same way, you may decide to automatically switch on computers on allowing users to work immediately upon their arrival. This is also possible through RemoteExec Wake up System action.
The computers using the Wake-on-line technology (available on most computers today) can be remotely powered on if this option is enabled. You just have previously to scan the Mac addresses and Subnet of your network machines using the System action Get wake up info (which can also be scheduled). Then using the same concept, you can choose to wake up users’ computers automatically.
If for any reason you remotely launch a shutdown that you want to abort, you can use the specific System action.
Download RemoteExec now
Check RemoteExec detailed features
Share this page:
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.