Only a quarter of IT professionals believe that biometrics is the safest way to confirm identity in order to access corporate data, according to new research from IS Decisions. In fact, no individual technology wins a majority. Biometrics (23%) comes one place behind two-factor authentication (29%), and edged only slightly ahead of the humble old … Continued
File Monitoring Software Update. Much more than a file access log.
We are pleased to announce the release of an update to our file monitoring software solution – FileAudit. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems in real time. Free 20 Day Trial Download of FileAudit IT professionals can set up … Continued
How to make your school network secure from the inside
IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student life as school dinners. Every day, pupils up and down the country log on to … Continued
Enhanced network logon security
When thinking seriously about Windows network security, an absolute must for an organization is to create a well structured security policy. However, regardless of the best intention from management, gaining top to bottom commitment is difficult to the point of being nigh on impossible. Humans are the weakest link Research conducted by IS Decisions found … Continued
Monitor user activity on Windows Server Network
Monitor user activity across a Windows Server-based network is key to knowing what is going on in your Windows environment. User activity monitoring is vital in helping mitigate increasing insider threats, implement CERT best practices and get compliant. However, it is important to stress that without multi-factor authentication, enhanced user access controls or the ability … Continued
Monitor Folder Changes in Windows – A Case Study
Being able to monitor folder changes on Windows servers is important for legal companies. A division from a well-known government law enforcement agency needed to better monitor and track the changes of sensitive files and folders presented in the prosecution of major criminals. The division deals with high profile cases such as murder, fraud and … Continued
LimitLogin vs UserLock
This blog post reviews how LimitLogin and UserLock limit concurrent user logins in an Active Directory domain. It will focus on the concurrent connection restriction feature provided by each solution and discuss how else they help an organization secure user access for Windows Active Directory environments. LimitLogin eight LimitLogin is an unsupported tool that was … Continued
Extending Microsoft Active Directory Security in 2014 and beyond.
For many organizations Active Directory is just the starting point when it comes to identity management and controlling and recording what users can do. Active Directory provides basis user security. It can check that credentials supplied match stored user profiles and then open access to different resources. Once a user is authenticated however, organizations need to apply … Continued
Windows Active Directory Security with IS Decisions
Securing your Windows Active Directory infrastructure. Every day here at IS Decisions, we’re lucky to engage with individuals from all over the world. Security and emergency response truly are global issues. We speak with individuals from organizations, companies and government departments that recognize their security needs go beyond what’s available in native Windows controls. We speak … Continued
IS Decisions: Home Grown and High Tech.
Home-grown and high-tech, IS Decisions continue to win renowned International clients such as The FBI, Barclays and the U.S. Department of Justice. IS Decisions featured on TV This TV report from LCI (a 24-hour French cable news network) focuses on how ‘this fast-growing company’ is intent on growing its International presence from its base in the … Continued