UserLock

, , Comments Off on Strengthen your Windows network password security and stop blaming the users

Strengthen your Windows network password security and stop blaming the users

Strengthen your Windows network password security and stop blaming the users

The problem with the password is not the password, it’s more the human use of passwords is flawed. We pick simple ones, we forget complex ones, we share them with our colleagues or our boss, or anyone else that appears to have an air of authority. IS Decisions research has shown that as many as … Continued

, , , , Comments Off on Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

To meet the demands of a remote and mobile workforce, today most companies offer employees access to their company mailbox from outside the office. This is most likely accomplished by either using Outlook Web Access (OWA) with a web browser or by using their phone with an ActiveSync mail client. Because these two common ways … Continued

, , , , Comments Off on Mitigating Credentials-based-attacks from Social Engineering

Mitigating Credentials-based-attacks from Social Engineering

Mitigating Credentials-based-attacks from Social Engineering

Following the recent CERT research on unintentional insider threats from social engineering, IS Decisions share their experience on how organisations are helping prevent security breaches that stem from credentials-based-attacks. Unintentional Insider Threats from Social Engineering The CERT Insider Threat Center recently published its research on unintentional insider threats focusing on the use of phishing and/or … Continued

, Comments Off on More protection against the Insider Threat with UserLock 8

More protection against the Insider Threat with UserLock 8

More protection against the Insider Threat with UserLock 8

Since the release of UserLock 7 eleven months ago, UserLock has helped equip more organizations with the means to prevent, detect and respond to the risk of the insider threat. We are now delighted to announce the release of UserLock 8 Beta Version. Click here to participate in the Beta testing program!   Considering that there … Continued

, , Comments Off on Securing students access to a school network

Securing students access to a school network

Securing students access to a school network

This Case Study highlights how state schools across Luxembourg utilized UserLock® to provide the necessary access control, restrictions and monitoring to help secure students access to a school network and the resources contained within. Key Findings For schools using Windows infrastructure, no native features are available to limit connections and report effectively on historic connections. It … Continued

Comments Off on UserLock Recommendations from your IT Security peers

UserLock Recommendations from your IT Security peers

UserLock Recommendations from your IT Security peers

When your researching and assessing solutions for the security of your Microsoft Windows and/or Active Directory infrastructure, we know your looking for honest, “tell it like it is” feedback. With the news that from April 14th, LinkedIn will discontinue the Products & Services tab and with it the accompanying product recommendations, we thought this would … Continued

, , , Comments Off on Two Factor Authentication for Banking & Financial Institution Employees

Two Factor Authentication for Banking & Financial Institution Employees

Two Factor Authentication for Banking & Financial Institution Employees

Whether its exploited users, careless behavior or outright malicious activity, UserLock helps banking and financial institutions to better protect against both the insider threat and external attacks, to ensure only the appropriate use of critical systems and sensitive data on a Windows Active Directory environment. The Insider Threat When we talk about cybercrime in the … Continued

, , , , Comments Off on Security considerations for Active Directory – User Access

Security considerations for Active Directory – User Access

Security considerations for Active Directory – User Access

How to overcome those that are determined to circumvent Security? Securing User Access to the Network Today, most organizations are looking for better ways to protect their network against insider threats. For Academic Institutions, this problem is of particular importance in stopping those who are smart enough to gain entry to whatever part of the … Continued

, , , Comments Off on LimitLogin vs. UserLock

LimitLogin vs. UserLock

LimitLogin vs. UserLock

Microsoft’s LimitLogin application and UserLock both limit concurrent user logins in an Active Directory domain, but the similarity largely stops there. This article will focus on how each solution restricts concurrent connections and discuss how else they help an organization secure user access for Windows Active Directory environments. LimitLogin LimitLogin is an unsupported tool released … Continued

, , , Comments Off on Extending Microsoft Active Directory Security in 2014 and beyond.

Extending Microsoft Active Directory Security in 2014 and beyond.

Extending Microsoft Active Directory Security in 2014 and beyond.

For many organizations Active Directory is just the starting point when it comes to identity management and controlling and recording what users can do. Active Directory provides basis user security. It can check that credentials supplied match stored user profiles and then open access to different resources. Once a user is authenticated however, organizations need to apply … Continued