Author Archives: Chris Bunn

Comments Off on Find where a user is logged on in a domain – and more

Find where a user is logged on in a domain – and more

Find where a user is logged on in a domain – and more

To detect where your users are logged on in real-time, watch this 2-minute overview of UserLock. It will also show you how to react and respond to any login, direct from the UserLock console, and how to start controlling and restricting how your users can connect. Video Transcription: Real-Time Visibility UserLock allows you to see … Continued

Comments Off on Why SMBs believe their data is unsafe in the cloud

Why SMBs believe their data is unsafe in the cloud

Why SMBs believe their data is unsafe in the cloud

Two thirds (61%) of small to medium-sized businesses (SMBs) believe that their data is unsafe in the cloud, with almost a third (29%) saying that they have suffered a breach since moving to the cloud for storage. Our new report, “Under a cloud of suspicion,” draws on research conducted with 300 heads of security within … Continued

, , , Comments Off on School Network Management. You’ve got your work cut out!

School Network Management. You’ve got your work cut out!

School Network Management. You’ve got your work cut out!

  If you’re responsible for school network management at a school, college or university, I don’t envy you. You have a tough job. Not only do you need to keep out the usual external threats like viruses, trojan horses, hackers and the like from your network; you need to ensure that you protect against students’ … Continued

Comments Off on On-Premises & Cloud Storage. Audit & Respond to your Hybrid File Environment.

On-Premises & Cloud Storage. Audit & Respond to your Hybrid File Environment.

On-Premises & Cloud Storage. Audit & Respond to your Hybrid File Environment.

With the new launch of FileAudit 6, IT professionals can now get insights into the access to and usage of data stored across both cloud and on-premises environments. Furthermore, FileAudit can now automatically respond and take action when an alert is triggered.     What’s new with FileAudit 6.0 IS Decisions has made two major … Continued

, , Comments Off on Windows File System Auditing. Video Tutorials for FileAudit

Windows File System Auditing. Video Tutorials for FileAudit

Windows File System Auditing. Video Tutorials for FileAudit

The IS Decisions team have made a new series of video tutorials on FileAudit – the file system auditing software. The Video Tutorials are designed to further complement existing resources that include support, documentation and a help section that includes your frequently asked questions. A how-to on Windows File System Auditing The full tutorial playlist … Continued

Comments Off on Who Last Accessed, or Attempted to Access your Shared Folders

Who Last Accessed, or Attempted to Access your Shared Folders

Who Last Accessed, or Attempted to Access your Shared Folders

As an important security and compliance measure, watch how you can easily identify activity on your most sensitive shared files and folders. FileAudit not only gives you optimal visibility into what is happening to your organization’s data but the opportunity to react quickly to events.   Video Transcription: In this video, I’m going to show you … Continued

Comments Off on Stronger Access Control Management

Stronger Access Control Management

Stronger Access Control Management

If your Windows network has data that could be of any value to someone without proper authorization to access it, then your organization needs stronger access control. The demand for secure access poses a serious challenge to IT professionals. IT have to balance network security with the need from users for quick and easy access … Continued

Comments Off on How to Monitor File Changes across Windows Servers

How to Monitor File Changes across Windows Servers

How to Monitor File Changes across Windows Servers

Who accessed a particular file share, and what changes happened? If you’re not able to answer this question quickly, you’re not alone. Monitoring file changes is one of the simplest tasks in keeping sensitive data safe but also one of the most neglected areas in many environments. FileAudit addresses this weakness with an easy-to-use reporting … Continued

Comments Off on Force Remote Logoff after Idle Time

Force Remote Logoff after Idle Time

Force Remote Logoff after Idle Time

With UserLock, watch how IT administrators can easily set an automatic forced logoff, on all locked or open machines, after a certain idle time. This can include remote desktop sessions opened by the domain user.     Resolving Optimization and Security Issues Fast and fluid access to shared workstations is key to their utility, but … Continued

Comments Off on Managing Call Center Access to a Windows Network

Managing Call Center Access to a Windows Network

Managing Call Center Access to a Windows Network

  The importance of getting access management right cannot be overstated. You need to make sure that anybody accessing your systems – and the data within – is exactly who they say they are. This is especially important when dealing with agents and customer service representatives who have access to vast amounts of sensitive data. … Continued

Secured By miniOrange