+1-800-492-3951 or +3184.108.40.206.20 (GMT+1)
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
From Brutus to Snowden: A study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Detect & Respond
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Zero Trust Security
Reduce the risk of security breaches from the insider threat
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
Academic institutions (universities, colleges, schools, training centers…) have a very specific IT challenge: In addition to their application environment, usually they also have to manage a network of free access workstations for the students / trainees.
For the larger establishments, this network can range anywhere between a few hundred and thousands of systems, rendering security and optimization essential.
UserLock, a software solution from IS Decisions, gives organizations the ways and means to efficiently enforce network access security as well as optimize workstation usage.
Secure a free access network
Optimize the use of free access computers
UserLock: Delegated and remote management
Share this page:
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved