Organizations around the world face an expanding cyber threat landscape. With at least 30,000 daily cyber incidents and a growing list of attack methods, protecting access to corporate networks has never been more critical. At IS Decisions, we’ve analyzed the last eight years of open-source data to uncover how specific industries, like government and public … Continued
Quickly approve 2FA push notifications with the UserLock Push App
We’re excited to announce the public beta release of UserLock 2FA push notifications with the UserLock Push app, making MFA frictionless for your team. MFA is a must for security, but it can’t get in the way of your team’s productivity. As more organizations apply MFA across all users, IT teams need the flexibility … Continued
Simplify MSP licensing and billing with the UserLock MSP console
Test the UserLock MSP Console – now in beta – and simplify your MSP licensing and billing. We’re pleased to announce the beta release of the new UserLock MSP console, a web-based licensing management platform. Now, managed service providers (MSPs) can easily administer UserLock licenses for all of their customers. Why use the UserLock MSP … Continued
The best single sign-on solution for Active Directory
Managing multiple user identities and passwords can be a hassle for employees and IT departments. Allowing password sprawl to spread to multiple corporate and cloud services can also pose a significant security risk for an organization. That’s where single sign-on (SSO) comes in. SSO allows users to access multiple applications using just one set of … Continued
The best multi-factor authentication (MFA) solutions for Active Directory
Active Directory (AD) is a widely used authentication and authorization system that provides access management for corporate networks. But, as cyberattacks become increasingly sophisticated and target user login credentials as the easiest point of entry, there is a critical need for strong authentication measures to increase protection. Multi-factor authentication (MFA) adds a layer of security … Continued
Protect patients’ data in healthcare using multi-factor authentication
Technology has transformed healthcare but this digital innovation also has one notable downside: cyber threats. And the price of stolen data shows just how much patient information is worth. As reported by credit rating agency Experian, hackers stand to make substantial sums from selling data on the dark web. In fact, stolen medical records can … Continued
The world’s most searched-for cyber attacks and prevention measures
Searches for cyber threats have seen a steady increase worldwide, particularly in the last year, proving that it’s a major concern for people all around the world. In fact, according to IBM’s Cost of a Data Breach report, the average cost of a data breach has reached an all-time high, climbing 12.7%, from $3.86 million … Continued
Get quick insights with improved NTFS permissions reporting
The latest FileAudit updates help make NTFS permissions reporting easy – and add the ability to migrate or archive your database. You want quick insights into access rights across the entire file system directory. And you need more control over your data. You spoke, we listened. Easily report on NTFS permissions & permission changes With … Continued
Stand down, marketers: Zero Trust is not a product
Thanks to relentless marketing, Zero Trust is quickly turning into another buzzword. It’s time security professionals claim to the term. Once and for all: Zero Trust is not a product, it’s a security strategy. While a product or service can indeed be part of a Zero Trust security strategy, no single product can satisfy all … Continued
Simplify MFA & session management with the new, intuitive UserLock Web App
The UserLock Web App allows IT teams to easily, quickly monitor, respond to, and report on MFA and network session activity – from anywhere. Now available in UserLock 11.2, the UserLock Web App complements your existing UserLock software with: An easy-to-use, visual interface that puts key network session monitoring controls at IT’s fingertips. Accessible, simplified … Continued