Verifying Windows users claimed identity to guard against unauthorized access from stolen or shared credentials.
1. Contextual access controls
Contextual access controls can define and restrict network access conditions for each authenticated Windows user.
- If credentials are compromised, any attempted access outside of these logon rules is automatically blocked. Shared or stolen passwords are therefore unsuccessful in obtaining network access.
- By verifying authenticated user’s claimed identity you can attribute all actions to an individual user and place accountability on network actions to discourage any illegitimate action – whether that might be just pranks or more serious malicious user activity.
- Transparent to the user this contextual access protection doesn’t impede or obstruct to ensure employees can remain productive.
2. Real-time monitoring and risk detection
Real-time monitoring and risk detection tools alert IT to any other suspicious logon activity so they can take action quickly – crucially before that activity becomes a serious problem.
What’s more, alerts and notifications on users own access sent ‘in situ’ helps users avoid careless mistakes and discourages malicious actions. For example, alerts when your own credentials are being used (successfully or not) to connect to the network.
Reduce the risk of security breaches
For Microsoft Windows Server-based networks UserLock can reduce the risk of both external attacks and internal security breaches from compromised credentials. A simple and non-disruptive technology, UserLock leverages an organization’s existing investment in Active Directory to extend its security, not to replace or overwrite it. Download a free 30 day trial today.