This Case Study highlights how state schools across Luxembourg utilized UserLock® to provide the necessary access control, restrictions and monitoring to help secure students access to a school network and the resources contained within. Key Findings For schools using Windows infrastructure, no native features are available to limit connections and report effectively on historic connections. It … Continued
Windows Network Access Control for Government Traffic Department
UserLock provides Windows Network Access Control and Security to Government State Traffic Department. By restricting, controlling and monitoring network access for over 2000 authorized users, UserLock helps Departamento Estadual de Trânsito de Pernambuco in Brazil protect sensitive data and mitigate insider threats. The need to control and secure ‘traffic’ to the network In such an organization … Continued
Tackling the security risk from internal users in Banking
The following case-study describes how the Bank of Cyprus reduces the security risk from internal users with UserLock. Offering the capability to control user access and react instantly to any related security incident, UserLock helps protect an organization’s critical assets by disabling concurrent users’ logins, preventing credential sharing and monitoring all session activity in real-time. … Continued
Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock
The IT Team at Oklahoma City Public Schools have a lot on their plate serving approximately 43,000 students over the district. To add to their workload, the team had been facing numerous challenges as a results of students – and staff – sharing their Windows network login. Oklahoma City Public Schools stops users sharing Windows … Continued
How to Track File Access in Windows – A Case-Study
Does your organization need to track file access? Do you need to monitor employee access to certain or all corporate files? With a wealth of information stored on file servers and document management systems, there is a need to track file access to protect organizations against malicious insiders with authorized access that are looking to … Continued