UserLock Enterprise Network Access Security & Logon Auditing

Secure, control & audit user access to Microsoft Windows Server-based networks and protect the resources and data contained within. Strengthen network logon security to prevent unauthorized access to enterprise networks and stop security breaches from both the malicious and careless insider threat.

Download free trial Watch the video

Taking security far beyond native Windows Active Directory functionality

UserLock continuously monitors all network logon events, across all session types (including Wi-Fi, VPN & IIS), automatically applying custom policies to permit or deny authenticated users’ access. Track, report and immediately respond to any suspicious logon behaviour, whether it originates on a PC, laptop or tablet.

Access Control & Restrictions

Set and enforce granular access rules to restrict and control user logins. Based on multiple criteria, offer access protection for your Windows network.

Limit Concurrent Logins

Prevent or limit concurrent or multiple logins, to avert one of the most potentially dangerous situations for a Windows Active Directory network.

Real-Time Monitoring & Alerts

Monitor all login and session events in real-time, receive alerts and instantly take appropriate security measures to alleviate IT security threats.

Auditing & Reporting

Record, centralize and audit all network logon events, across the whole Windows network, for comprehensive reports and detailed insights.

An Intuitive Interface that facilitates the easy administration of UserLock

Reduce the risk of security breaches from insider threats

Any network has authorized employees (authenticated users) who have access and rights, carrying out the kind of bad or careless behaviour that often leads to security breaches.

Strengthen and secure the Windows infrastructure to prevent internal security breaches, respond instantly to emergency situations and realize time and cost savings for IT through powerful access and logon intelligence.

Unauthorized access to information can have serious consequences for organizations. UserLock offers fine-grained access control combined with proper computer account management to ensure the security of network access and the protection of its data.

UserLock offers an immediate and remote response to suspicious, disruptive or unusual logon connections to reduce the risk of insider activity. An integral part of any organizations security policy and risk mitigation strategy.

UserLock ensures unauthorized access is no longer a possibility – even when credentials are compromised. It stops malicious users seamlessly using valid credentials.

Limiting or preventing concurrent logins with UserLock significantly decreases the likelihood of users sharing passwords as it impacts their own ability to access the network. It provides the motivation to adhere to password security policy and help protect the organization’s critical assets.

UserLock secures network access across all session types, including Wi-Fi and VPN, and permits an organization to control their wireless networks and secure bring-your-own-device (BYOD) environments.

By centralizing and archiving all access events across the whole Windows Network, UserLock offers comprehensive reports and detailed insights on who was connected, from which system, since what time, for how long etc.

UserLock records and reports on every session access event, enabling IT security teams to perform accurate and detailed IT forensics to support internal analysis and legal investigations.

UserLock supports IT’s effort to communicate consistent and clear security policies and controls through its notification system. This can include warning users about any access denials on their account.

UserLock provides specific features to identify, search, report and archive user access for compliance with major industry regulations, including HIPAA, NIST 800-53, Sarbanes-Oxley, NISPOM Chapter 8, PCI, Bâle II, ICD 503…

A Rapid Response with Mobile Administration

New remote session administration design allows facilitation from any device (smartphone, tablet or computer). Administrators can now ensure a rapid response on the move to suspicious access events, an integral part of any risk mitigation strategy.

Try it now
UserLock Mobile Application

UserLock 8 offers even more protection against the Insider Threat

Evaluate & Detect users suspicious access behaviour

The real-time monitoring now incorporates a risk indicator to better identify suspicious access behaviour at a glance. By correlating each users’s access events with their customized authentication controls, the new ‘User Status’ helps deliver a more complete view of an organization’s network activity and security risks.

Compromised Password Protection

In addition to UserLocks’ controls and restrictions that allow administrators to act immediately to compromised login credentials, UserLock 8 also now alerts users in real-time when their own credentials are used (successfully or not) to connect to the network. This helps users protect the access and resources that are entrusted to them.

Secure privileged users

UserLock’s own settings, logs and policy rules can now be secured to protect against bad behaviour by those who have administration rights and answer the needs for many major regulatory compliance requirements. UserLock 8 can now verify the trust given to privileged users.

Analyst Reports: New. Ovum "On the Radar" UserLock Report

Learn how UserLock provides businesses with facilities that stregthen network logon security

Get the report

Download UserLock

VersionSupported systems
Lab tests only.
Please contact us to join the beta-test program for production implementation.

Windows XP
| Windows Server 2003 | Windows Vista | Windows Server 2008 | Windows 7 | Windows Server 2008 R2 | Windows 8 | Windows server 2012 | Windows 8.1 | Windows Server 2012 R2 | Windows 10 (64 bits computers included)
Windows XP | Windows Server 2003 | Windows Vista | Windows Server 2008 | Windows 7 | Windows Server 2008 R2 | Windows 8 | Windows server 2012 | Windows 8.1 | Windows Server 2012 R2 | Windows 10 (64 bits computers included)

Demo restriction : 30-day full version with no user limits

Scroll to top