Enterprise Network Security Blog from IS Decisions

Secure SSO for Cloud Applications using existing on premise Active Directory Identities

Secure SSO for Cloud Applications using existing on premise Active Directory Identities

The new release of UserLock 11 provides existing on-premise Active Directory (AD) Identities with secure Single Sign-On (SSO) access to both the corporate network and multiple cloud applications, from wherever they are working. In combination with Multi-Factor Authentication (MFA) it enables on-premise AD identities to securely access Microsoft 365 and other leading cloud applications. For maximum … Continued

RDP Gateway MFA

RDP Gateway MFA

Multi-factor authentication (MFA) for Remote Desktop Gateway and RDP connections should be very high on your security to-do list. Some or even your entire workforce might now be dispersed but their access to company networks still needs to be protected.…

Understanding the “After Ransomware” helps MSPs protect against it

Understanding the “After Ransomware” helps MSPs protect against it

Today we have all unfortunately heard about this type of criminal moneymaking scheme. We know – more or less – how to catch it, what happens during the ransomware attack, but we have much less visibility on the ‘after’. It…

Windows Domain 2 Factor Authentication (2FA)

Windows Domain 2 Factor Authentication (2FA)

Windows domains and Active Directory (AD) makes it easy for administrators to control a large number of business PCs and devices from a central location. Today, a huge percentage of enterprises continue to rely on Windows domain AD to manage assets,…

Why your VPN connections need two-factor authentication (2FA)

Why your VPN connections need two-factor authentication (2FA)

Virtual private networks (VPNs) are very popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between remote machines and your servers, VPNs solve some very important problems. They…

Windows Logon Audit Far Beyond Native Windows Security

Windows Logon Audit Far Beyond Native Windows Security

  Windows logon auditing is an important activity for diverse security and compliance needs. Businesses may require a full and accurate logon audit to: perform accurate forensics demonstrate they are protecting data from unauthorized access – for regulatory compliance verify the attendance / working hours of any employee monitor specific session types such as remote … Continued

Yubikey 2 Factor Authentication for Windows Logins

Yubikey 2 Factor Authentication for Windows Logins

UserLock makes it easy for a business to enable two-factor authentication on Windows accounts, managed by Active Directory. Watch how UserLock works with YubiKey – the hardware security keys manufactured by Yubico. YubiKey offers users an easy and secure second factor of authentication In addition to mobile authentication and Token2, UserLock now partners with Yubico to offer … Continued

Windows File Auditing Log and more with FileAudit

Windows File Auditing Log and more with FileAudit

FileAudit is an intuitive tool that simplifies native Windows file auditing log. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems in real time. Free 20 Day…

Protecting Active Directory logins for remote working

Protecting Active Directory logins for remote working

  The boom in working from home has become a bonanza for cyber attackers. Each time an employee connects to the corporate network from their home they create an access point that can often be exploited. With Windows Active Directory…

Stay Safe but Stay in Business

Stay Safe but Stay in Business

COVID-19, 5 letters and 2 numbers that have turned everyday life upside down for millions of people and organizations across the globe. In an effort to slow the propagation of the virus, governments of several countries have put in place…

Login Logout Time Tracking for Employees

Login Logout Time Tracking for Employees

With more and more organizations allowing flexible work hours and users working remotely, it is increasingly important to be able to manage and monitor employee’s working hours.  Being able to track not only login and logout times, but lock and…

Secure Active Directory Users’ Accounts

Secure Active Directory Users’ Accounts

Users are most of the time the weakest link in your organization. But you need to stop blaming them. It’s your job to secure the organization from unwanted access. You need to protect them from their own careless behavior and mitigate against any malicious activity. In order to do that, you need to make sure … Continued

Why do you need Multifactor Authentication?

Why do you need Multifactor Authentication?

Without Multifactor Authentication, organizations are wide open to attack when their employees fall for phishing scams or share passwords. What’s holding them back? Stolen credentials are one of the biggest threats to businesses today. The reason behind that is simple, the attacker is actually using valid (that is, compromised but valid) credentials, so why would … Continued

MFA for Windows Login to Address the Vulnerabilities of Corporate Passwords

MFA for Windows Login to Address the Vulnerabilities of Corporate Passwords

Easy for both administrators and employees, UserLock now offers multi-factor authentication (MFA) for Windows login alongside contextual controls, for the best balance of security, usability and cost available today. IS Decisions, a provider of access management software, today announced a…

How to Avoid Data Breaches on Windows Infrastructure

How to Avoid Data Breaches on Windows Infrastructure

It seems like IT’s general approach to any kind of attack – which includes data breaches – is a reactive one. Think about it, in every kind of attack-related scenario – whether an external attack, an insider threat, malware infection,…

Windows Group Policy for Login Security

Windows Group Policy for Login Security

The use of Windows Group Policy is often the tool of choice for the strict administration of Active Directory (AD) user accounts. But for logon and access policies, Group Policies can be tedious to configure, particularly so for small and…

Find Active Directory Users Logged on in a Domain – and more

Find Active Directory Users Logged on in a Domain – and more

To detect where your Active Directory users are logged on in real-time, watch this 2-minute overview of UserLock. It will also show you how to react and respond to any login, direct from the UserLock console, and how to start…

Why SMBs believe their data is unsafe in the cloud

Why SMBs believe their data is unsafe in the cloud

Two thirds (61%) of small to medium-sized businesses (SMBs) believe that their data is unsafe in the cloud, with almost a third (29%) saying that they have suffered a breach since moving to the cloud for storage. Our new report, “Under a cloud of suspicion,” draws on research conducted with 300 heads of security within … Continued

Secured By miniOrange