IS Decisions is pleased to announce the UserLock 9.0 Beta Testing Program. This major upgrade comes with numerous new features and enhancements including: Verify and manage users Initial Access Point to better secure all subsequent network connections Block all logon attempts remotely, for any specific user, to react quickly to suspected compromised credentials Set and … Continued
IS Decisions receives the Label France Cybersecurity for UserLock
Following a general review of the French government’s cybersecurity plan, IS Decisions was one of 18 companies awarded quality labels as a further assurance to users that their systems are effectively protected from cyber threats. A Quality Label for French Cybersecurity Solutions France Cybersecurity is a national association where industry professionals, end users and government experts … Continued
Protecting Files from Unauthorized Access
FileAudit, which enables IT professionals to proactively monitor access to company-sensitive files and folders on Windows systems in real time, has received a major update. The latest version, FileAudit 5, includes three significant new features to better protect files from unauthorized access and alteration of sensitive information. To view the video, please accept all cookies. Alerts … Continued
IS Decisions y MacroSeguridad se presentarán en Segurinfo Argentina 2015
IS Decisions, junto con el distribuidor MacroSeguridad, se presentarán en Segurinfo Argentina 2015, Congreso y Feria Iberoamericana de Seguridad de la Información que se llevará a cabo en Buenos Aires el 10 de marzo de 2015. IS Decisions together with our partner MacroSeguridad will be represented at the upcoming Segurinfo Argentina 2015. This leading Information … Continued
Strengthen your Windows network password security and stop blaming the users
The problem with the password is not the password, it’s more the human use of passwords is flawed. We pick simple ones, we forget complex ones, we share them with our colleagues or our boss, or anyone else that appears to have an air of authority. IS Decisions research has shown that as many as … Continued
From Brutus to Snowden. A Study of Insider Threat Personas
Today IS Decisions reveal a new study on the attitudes and behaviors of users with regards to internal security. From Brutus to Snowden: A study of Insider Threat Personas Following on from the ‘Insider Threat Manifesto‘ launched earlier this year which highlighted attitudes of IT Professionals, we now turn our spotlight on the users themselves. Learn who … Continued
5 steps to stop password sharing
One of the biggest internal security issues every organization has to deal with is password sharing. On Windows Active Directory networks the threat of shared passwords can be alleviated with UserLock. UserLock’s concurrent login controls and context-aware access restrictions mean IT teams can now control where and how each employee accesses the network. This level of security is not … Continued
More protection against the Insider Threat with UserLock 8
Since the release of UserLock 7 eleven months ago, UserLock has helped equip more organizations with the means to prevent, detect and respond to the risk of the insider threat. We are now delighted to announce the release of UserLock 8 Beta Version. Click here to participate in the Beta testing program! Considering that there … Continued
UserLock Recommendations from your IT Security peers
When your researching and assessing solutions for the security of your Microsoft Windows and/or Active Directory infrastructure, we know your looking for honest, “tell it like it is” feedback. With the news that from April 14th, LinkedIn will discontinue the Products & Services tab and with it the accompanying product recommendations, we thought this would … Continued
Technology Solutions for the Insider Threat
Nearly 90% of IT professionals believe the ‘insider threat’ is cultural not a tech issue. Only 1 in 10 UK companies are aware they can use a technology solution to actively manage & reduce the threat from within The vast majority (86%) of IT professionals consider insider threats to be a purely cultural issue, … Continued