concurrent logins

, , , , , , Comments Off on Network security in Universities, Colleges and Schools.

Network security in Universities, Colleges and Schools.

Network security in Universities, Colleges and Schools.

IT teams responsible for network security in Universities, Colleges and Schools are experiencing more and more pressure to secure their networks from both external and insider threats. According to the CSO,13% of data breaches last year happened at educational institutions. According to EDUCAUSE, a nonprofit association of IT leaders in higher education, information security remains the #1 issue in 2018 for the third … Continued

, , , Comments Off on HIPAA unique user identification in a Windows System

HIPAA unique user identification in a Windows System

HIPAA unique user identification in a Windows System

Healthcare is one of the most information intensive industries in society today, with patient data naturally being of a very sensitive nature, and the handling of that data often very complex. So to help protect this information, US medical organizations must adhere to HIPAA (Health Insurance Portability and Accountability Act), a set of regulations enforced … Continued

, , , , Comments Off on Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

To meet the demands of a remote and mobile workforce, today most companies offer employees access to their company mailbox from outside the office. This is most likely accomplished by either using Outlook Web Access (OWA) with a web browser or by using their phone with an ActiveSync mail client. Because these two common ways … Continued

, , , Comments Off on LimitLogin vs UserLock

LimitLogin vs UserLock

LimitLogin vs UserLock

This blog post reviews how LimitLogin and UserLock limit concurrent user logins in an Active Directory domain. It will focus on the concurrent connection restriction feature provided by each solution and discuss how else they help an organization secure user access for Windows Active Directory environments. LimitLogin eight LimitLogin is an unsupported tool that was … Continued

, , , , , , Comments Off on Windows Network Access Control for Government Traffic Department

Windows Network Access Control for Government Traffic Department

Windows Network Access Control for Government Traffic Department

UserLock provides Windows Network Access Control and Security to Government State Traffic Department. By restricting, controlling and monitoring network access for over 2000 authorized users, UserLock helps Departamento Estadual de Trânsito de Pernambuco in Brazil protect sensitive data and mitigate insider threats. The need to control and secure ‘traffic’ to the network In such an organization … Continued

, , , , Comments Off on Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock

Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock

Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock

The IT Team at Oklahoma City Public Schools have a lot on their plate serving approximately 43,000 students over the district. To add to their workload, the team had been facing numerous challenges as a results of students – and staff – sharing their Windows network login. Oklahoma City Public Schools stops users sharing Windows … Continued

, , , Comments Off on Can a Windows Logon Script Control Concurrent Logins?

Can a Windows Logon Script Control Concurrent Logins?

Can a Windows Logon Script Control Concurrent Logins?

Is it a good idea to use a windows logon script to control concurrent sessions on Windows Servers? When it comes to a login script and limiting simultaneous sessions we can affirm categorically that solutions based on windows logon script present too many drawbacks and weaknesses to suit medium to large IT infrastructures’ security requirements. … Continued

, , , , , , , Comments Off on Auditing Logon Events. Why stop there?

Auditing Logon Events. Why stop there?

Auditing Logon Events. Why stop there?

Auditing logon events across a Windows network is often a priority for organizations wanting to secure access to their network and better understand user activity. What’s more it is required for an Information System to comply with most major regulatory constraints. However, auditing logon events on their own is not enough for organizations who are … Continued

, , , , Comments Off on Password Security Policy: Managing the threat of shared passwords in enterprises.

Password Security Policy: Managing the threat of shared passwords in enterprises.

Password Security Policy: Managing the threat of shared passwords in enterprises.

The effectiveness of any password security policy depends on users not sharing passwords. Popular circumstances where users believe their actions are justified include; delegating work to others and vacation coverage. Here we look at the danger of shared passwords and how to stop the threat through UserLock’s multi-factor authentication and contextual access controls. An IT Security … Continued

Secured By miniOrange