+1-800-492-3951 or +3188.8.131.52.20 (GMT+1)
Secure Active Directory user logins with two factor authentication, contextual access controls and real-time monitoring and reporting.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems and in the cloud.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
See all insights
Two-Factor Authentication Solution for Windows & RDP Logons
Under a Cloud of Suspicion
Auditing File Access in the Cloud
Information Security Advice for SMB (Infographic)
The Role of File Auditing in Compliance
Key Indicators of Compromise to Prevent a Breach
On June 5, 1999, the Director of Central Intelligence Issued Directive 6/3 (DCID 6/3) titled "Protecting Sensitive Compartmented Information Within Information Systems." It establishes the security policy and procedures for storing, processing, and communicating classified intelligence information in information systems. An implementation manual corresponding to DCID 6/3 was published on May 24, 2000.
The directive applies to all United States government organizations’, their commercial contractors', and Allied governments' information systems that process, store, or communicate intelligence information.
IS Decisions solutions fulfil the following DCID 6/3 requirements for dealing with information system security:
DCID 6/3 Policy
DCID 6/3 Manual
Share this page:
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.