+1-800-492-3951 or +3126.96.36.199.20 (GMT+1)
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Reduce the risk of security breaches from the insider threat
Control system access, identify employees on the network, respond to suspicious activity & protect patient data with IS Decisions solutions. Read more
Strong access control measures, enforced unique user ID and enhanced access monitoring to the network and cardholder data with our solutions. Read more
Userlock and FileAudit can both help you address the requirements of SOX by allowing you to control and monitor system access and identity. Read more
UserLock and FileAudit protect the network, and sensitive information within, against unwanted access to help your business become ISO 27001 compliant. Read more
UserLock directly addresses two access control baselines of NIST 800-53, AC-9 Previous Logon (Access) Notification and AC-10 Concurrent Session Control. Read more
This guide looks at some of the key areas for HIPAA compliance and the NHS Security policies with relation to internal safeguards.
Check if you're compliant
Research and guidance on access security for PCI, SOX, GLBA and FCA regulations that safeguard sensitive financial and customer data.
Research and guidance on user security and information access compliance for FISMA, ISO 27001, DPA and Lexcel regulations.
Rather than blaming users for being human, start better protecting users’ authenticated access.
If you are implementing an insider threat program, here’s a 12 step guide to help ensure that it’s set for the future of internal security.
An alternative to complex, costly and disruptive multi-factor authentication
A report on the frustrations that IT managers face with multi-factor authentication and how to improve access security without impeding end users or disrupting existing infrastructure.
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
From Brutus to Snowden: A study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
Do your actions risk your employer's security? Prove it!
Play The Weakest Link - A User Security Game.
Free to play for any employee in any position, from any department.Help engage your users and reinforce their user security awareness.
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
Previously we have looked at how UserLock let’s organizations lock down users on a Windows network. With restrictions set and enforced UserLock then empowers IT teams to track and record all user activity and gives network administrators a way to remotely control user sessions.
UserLock monitors and records all Windows Active Directory sessions in real time, providing a log of access information for audit and forensics. Comprehensive reports and detailed insights on who was connected, from which system(s), since what time, for how long, etc…
UserLock enables this auditing by writing user session history to a ODBC Database (Microsoft Access, SQL Server, MySQL) for reporting. This is a necessary feature for many compliance regulations.
One such report in UserLock is ‘Session History’. Highlighted in the accompanying video tutorial, this offers detailed connection details of all user logon, lock, logoff instances for users, domains, workstations etc…
For all reports, different sections can be personalized to show the results that are most pertinent to the organization. The ‘Configuration Section’ groups the specific criteria available for the selected report. Filters can be defined on the nature of sessions, specific characteristics of each session and their types.
With the ‘Protected group filter’ UserLock can display only the history for users that are members of a specific protected account rule.
The Time Section permits a defined time range for the report. This parameter is important on reports and it directly impacts the readability and relevance of any result – particularly for organizations with a large number of users or a substantial history achieved in the database. The number of generated pages in a report can be a real barrier to performing the best analysis.
Reports will be generated on either the current data source or any archived database.
Two style options for design allow the report construction to be adjusted according to the file type needed for exporting the results.
Once configured, the report is launched. The time necessary to generate the report will depend on the different criteria selected and the time range chose. Reports can then be printed or exported on a different format.
Regularly viewed reports can be scheduled (e.g. the session history for the past week) and sent on email.
This type of server report uses the service real-time information. This gives an instant result of the User Sessions view, the Agent distribution view or the dashboard.
Similar to database reporting, sections can be personalized and filters set through the ‘Configuration Section’.
Also, as previously seen with the Database reporting, reports can be launched directly, exported or scheduled if needed.
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.