+1-800-492-3951 or +3126.96.36.199.20 (GMT+1)
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
From Brutus to Snowden: A study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Detect & Respond
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Zero Trust Security
Reduce the risk of security breaches from the insider threat
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
Simon Passmore, Senior Development and Support Officer (Systems Team) ICT, Corporate Information and Technology Department at South Wales Police, has been using UserLock since 2006 and shares his opinion about IS Decisions software solution to secure and control access to Windows-based networks.
«We are very impressed with UserLock and IS Decisions as a whole. Since we purchased the product in approx August 2006 we've had no issues with the software whatsoever.
We have an organization of around 10,000 users and approx 4 – 5,000 machines and we trialed about 4 other products before coming across UserLock.
Our initial investigations in UserLock and support from the support department at IS Decisions convinced us that UserLock was the application we were looking for. To this day, UserLock continues to impress us with its resilient nature and the efficiency at which it operates.
Without going into too much detail, the product itself is running on a handful of servers for resilience and continues to impress us with its throughput.
We operate on a 24/7 basis as you'd expect and we know that UserLock will continue to operate with minimum manual input throughout this time.
I say minimum manual input, but in fact I can't remember the last time I had to open the console to check on it. It's automated in its deployment and runs smoothly and transparently throughout the whole login process, even on our Force built machines which are heavily locked down.
Besides a solidly written application, the support network provided by IS Decisions is second to none, I've contacted support with regards small tweaks to the application and also some custom reports required from the product and they have always returned an email to me with a response within minutes, it's remarkable!
All in all I would recommend this product to other organizations as it does exactly what it says on the tin, is backed by a fantastic support infrastructure and in our opinion is the best on the market at this present time.»
Senior Development and Support Officer (Systems Team) ICT
Corporate Information and Technology Department / Adran Technoleg a Gwybodaeth CorfforaetholSouth Wales Police / Heddlu De Cymru
Share this page:
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved