Use Case

OT and IT/OT convergence security

Boost resilience with identity-centric access security at the point of IT and OT convergence in layer 3.5 and in OT networks in zone 2. With UserLock, there’s a simple, secure way to keep attackers out and business operations running.

The challenge of IT/OT convergence security

Informational technology (IT) and operational technology (OT) systems often share identity infrastructure and systems in isolated or legacy Windows systems.

These may be AD-based or on a standalone Windows server, but native identity management is limited or nonexistent.

As IT and OT networks converge, OT teams often struggle to fight identity-based threats:

  • Shared or weak credentials on OT workstations

  • No MFA or login audit on ICS, SCADA, or HMI systems

  • Inconsistent policy enforcement between environments

  • Centralized auditing and reporting on access

UserLock Screenshots

How UserLock supports secure IT/OT integration

Put identity controls exactly where you need them, on level 3.5 and Windows-based level 2 assets, without touching fragile PLCs or HMIs.

  • Enforce granular MFA

  • Apply contextual access controls

  • Set limits on sessions

  • Block suspicious behavior without disrupting users

UserLock helps critical infrastructure and industrial control systems (ICS) apply modern access controls to Windows-based OT devices using the existing AD identity.

It’s easy to use, easy to scale, and keeps IT in control.

Comprehensive access control for IT and OT

Two factor authentication

Enforce MFA on Windows-based systems and apps

Enforce MFA with or without smartphones across IT and OT endpoints. MFA on UAC prompts helps block lateral movement at the IT and OT convergence layer. Maintain access policies in offline or airgapped OT environments.

Single Sign-On

Extend strong authentication to SaaS access

Enable single sign-on (SSO) for AD identities to extend on-prem authentication from local systems to SaaS resources. Users enter their password once at login, complete strong authentication, and gain access to SaaS apps.

Temporary and permanent policies

Limit access with contextual restrictions

Restrict access based on location, time, device, and block concurrent logins. Apply policies by AD user, group, or OU.

Active sessions - Active Directory

Monitor and manage logon sessions

See all AD identity access IT into sensitive OT environments. Set up alerts so IT can quickly spot and react to threats across all Windows-based systems and apps.

Simultaneous sessions chart report

Audit and report on access

Produce clear reports of who accessed what, when, and from where, no manual logs required.

Why IT and OT teams choose UserLock

Phone-less MFA

Use YubiKeys or Token2 hardware tokens for easy, secure MFA. at the Windows credential provider level.

Days to value

Set up UserLock in minutes or hours, not days. The agent-based software is easy to install and manage, and allows for granular session-based access controls.

Air-gap compatible

Bring modern access controls to air-gapped Windows-based systems, terminal servers, and legacy apps.

Remote access security

Apply MFA policies and and session limits to Remote Desktop, RDP, VPN, and RemoteApp connections.

Instant visibility and response

See who logs on, where, and how in real time. Block, log off, or disable an account with one click.

Audit ready

Take the manual work out of auditing and reporting. UserLock records every successful or failed Windows login in tamper-proof, searchable logs.

  • Strong 2FA and concurrent login restrictions for HIPAA compliance.

    I can’t trust that someone is a legitimate user or administrator just because they were on a computer on-site. Now I can verify who’s using our computers with UserLock.

    Read the case study

    Mark Shorts

    Lead Support Tech | Meadville Medical Center

    2FA and Concurrent Login Restrictions Ensure Compliance Without Slowing Workflows for Healthcare Organization
  • Windows MFA meets cyber-insurance requirements

    I've seen a lot of software over the years. UserLock is one of the most simple and user-friendly I've ever used.

    Read the case study

    IT Supervisor

    US City Government

    2FA for U.S. City Satisfies MFA Cyber Insurance & Improves Risk Management
  • UserLock MFA is a high quality, full-featured product that performs as advertised.

    Read the case study

    Michael Commons

    System Administrator | Dobbs Peterbilt

    Offline Multi-Factor Authentication (MFA) for remote working