+1-800-492-3951 or +318.104.22.168.20 (GMT+1)
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Reduce the risk of security breaches from the insider threat
Control system access, identify employees on the network, respond to suspicious activity & protect patient data with IS Decisions solutions. Read more
Strong access control measures, enforced unique user ID and enhanced access monitoring to the network and cardholder data with our solutions. Read more
Userlock and FileAudit can both help you address the requirements of SOX by allowing you to control and monitor system access and identity. Read more
UserLock and FileAudit protect the network, and sensitive information within, against unwanted access to help your business become ISO 27001 compliant. Read more
UserLock directly addresses two access control baselines of NIST 800-53, AC-9 Previous Logon (Access) Notification and AC-10 Concurrent Session Control. Read more
This guide looks at some of the key areas for HIPAA compliance and the NHS Security policies with relation to internal safeguards.
Check if you're compliant
Research and guidance on access security for PCI, SOX, GLBA and FCA regulations that safeguard sensitive financial and customer data.
Research and guidance on user security and information access compliance for FISMA, ISO 27001, DPA and Lexcel regulations.
Rather than blaming users for being human, start better protecting users’ authenticated access.
If you are implementing an insider threat program, here’s a 12 step guide to help ensure that it’s set for the future of internal security.
An alternative to complex, costly and disruptive multi-factor authentication
A report on the frustrations that IT managers face with multi-factor authentication and how to improve access security without impeding end users or disrupting existing infrastructure.
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
A Study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
ISO 27001/2 Compliance - Information access and user security
Learn about the requirements of ISO 27001 and ISO 27002 compliance with regards to user security and information access and where organizations could be doing better today.
Do your actions risk your employer's security? Prove it!
Play The Weakest Link - A User Security Game.
Free to play for any employee in any position, from any department.Help engage your users and reinforce their user security awareness.
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
A UserLock backup server can be installed on the protected zone, to guarantee failover if the primary UserLock server experiences any hardware or network issues.
This UserLock Backup server synchronizes its configuration and its session’s database regularly with the Primary server. If the Primary server goes down, all client workstations can be protected by the Backup server. The different UserLock agents will automatically switch to the backup server to maintain the security rules. Once the Primary server will be available again, agents will switch back automatically to the Primary server.
The Backup server requirements are the same as the Primary server. Just choose a server member of the same protected zone as that of the Primary. To install a Backup server just start the same setup as you did for the Primary server.
As the first step is the same, we will focus here on the Configuration wizard.
Select here ‘Backup server’. You need to specify the Primary server netbios name.
Enter a service account for the UserLock Backup server. This account needs to have full permission rights on the Primary UserLock server. You need to add this account on the Security section of your Primary server and allow all features for it.
Click on finish, the service will start automatically.
By default the database used by the Backup server will be an MS Access database. You can change this database to a MS SQL Server database to improve the performance and the amount of historic data that you can keep. Take note that the Primary and the Backup server can’t target the same database. You can use the same MS SQL Server hosting the two distinct databases.
Right click on the Backup server name and select ‘Properties’. Display the ‘Logs’ section. To change the database, switch to ‘Other database’. Launch the Wizard and check SQL server. Enter the name of the MS SQL Server, set the authentication option and select the empty database you previously created. The account used for the database is the account set on the UserLock backup service. It needs full privileges on this database. Click on ‘OK’.
As the database is new and empty, click on Create Database tables.
The UserLock Backup server is now configured.
If you take a look at the console of your backup server, you will see that the Agent distribution menu is not available, and that the protected account rules can’t be modified. These points are managed by the Primary server.
All settings from the Primary server, except the Email settings and Log settings, are synchronized to the Backup server.
The session synchronization is differential. This means that only new sessions are displayed after each synchronization event and the two databases will be identical shortly after.
Display the Backup server properties. On the Synchronization section, you can personalize the frequency of the synchronization between the two UserLock servers, test it and enforce it.
The UserLock Policies will be now maintained on your network if an issue happens on the Primary server. In addition, if for any reason the Primary server can’t come back online, you should be able to transform this Backup server to a Primary server by just launching again the configuration wizard and switching its role.
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.