+1-800-492-3951 or +318.104.22.168.20 (GMT+1)
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Reduce the risk of security breaches from the insider threat
If you are implementing an insider threat program, here’s a 12 step guide to help ensure that it’s set for the future of internal security.
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
From Brutus to Snowden: A study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
This guide looks at some of the key areas for HIPAA and the NHS Security policies with relation to internal safeguards.
Check if you're compliant
Steps taken with new staff.
People related processes to protect access to electronic protected health information.
Technology’s place to minimize the risks from employees and decrease the surface area vulnerable to attack.
Levels of access control needed to maintain confidentiality of data records whilst ensuring prompt access to ensure proper delivery of care.
Requirements when employees move role or leave an organization.
Do your actions risk your employer's security? Prove it!
Play The Weakest Link - A User Security Game.
Free to play for any employee in any position, from any department.Help engage your users and reinforce their user security awareness.
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
NDS and NetWare gave network administrators the ability to easily enforce certain restrictions on their network especially the ability for a person to open simultaneous sessions with the same login.
As with most things in Netware Directory Services, restricting concurrent connections could be performed from the administrative workstation using the NetWare Administrator utility.
When migrating to Windows Server and Active Directory, former Netware network administrators are therefore surprised to discover that Windows offers no native feature to prevent or limit simultaneous logins to their new network.
That is where UserLock comes in handy, with concurrent logins limitation features even more powerful than Netware’s native features. UserLock allows you to limit or prevent simultaneous logins to a Microsoft Windows network, per user, user group or per session type (workstation, terminal, interactive or VPN/RAS).
Limitations can be set in a granular way and can vary from one user to another or from one group to another.
With UserLock you will be able to define and enforce:
You will also be able to:
Share this page:
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.