+1-800-492-3951 or +3188.8.131.52.20 (GMT+1)
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems and in the cloud.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
See all insights
Under a Cloud of Suspicion
Security Far Beyond Active Directory Password Policy
Auditing File Access in the Cloud
Information Security Advice for SMB (Infographic)
The Role of File Auditing in Compliance
Key Indicators of Compromise to Prevent a Breach
Boost your knowledge with our research, white papers and thought leadership on some of the biggest security risks that concern Microsoft Windows and Active Directory-based Infrastructure.
Filter by topic:
Sorry no results found with your filters. Please try another search.
A report that unpicks the perceptions of cloud storage with 300 heads of security, and discovers how SMBs are overcoming these security issues.
Active Directory passwords are effortlessly compromised. UserLock verifies user credentials beyond password policies to ensure users really are who they say they are.
Abnormal user activity is the key to spotting insider threats. UserLock uniquely empowers IT organizations to leverage the active directory logon as a critical security checkpoint before insiders take action.
The role of UserLock in PAM to protect any account with privileged access whilst also enhancing the security of all privileged accounts
Poor logon security can lead to devastating data breaches, but improving the way you manage access is no easy feat — especially if you rely on Windows Active Directory alone. Our infographic highlights 8 security holes in Windows Group Policy Settings and how to fix them.
The functionality you should expect from file auditing, the influence on auditing when you move files to the cloud and how to audit changes to your on-premises and cloud environments.
It's no easy feat securing the SMB. Our Infographic highlights 8 SMB-friendly criteria to help choose IT security solutions that achieve maximum impact with minimum effort.
Why delegating auditing to company executives outside of IT makes for more accurate and secure results.
Discover how SMBs and the MSPs serving them can achieve enterprise caliber IT security in terms of focus and effectiveness, but with SMB sensibilities in terms of implementation and use.
How does Logon Management with UserLock help detect security threats, when compared to a SIEM solution? UserLock makes the logon itself a scrutinized and protected event. The ability to successfully logon (and remain logged on) becomes more than just whether the right credentials are used.
Securing access to critical systems and sensitive data in education institutions through better logon management.
Serious security concerns from your IT peers around the effectiveness of Windows Active Directory to manage employee logons to corporate networks.
The file system is used as either a target or an asset to further malicious activity– making file access the way to both identify and potentially stop a data breach.
How can organizations achieve both elevated security and productivity with Active Directory Logon and Single Sign-On.
How you can use File Auditing to help meet compliance objectives to protect data on Windows Systems and in the cloud.
A leading attack indicator that no malicious insider or external threat actor can get around – the logon.
With the rampant misuse of user credentials. least privilege must manage access from all users not just privilege accounts.
Learn how to protect personal data found on Windows files, folders and file shares. Bolster access security for network, file and folder activity. Get GDPR compliant
By taking steps to put policy, controls, and monitoring in place, you can minimize – if not completely stop – password sharing, and reduce the risk of a security breach.
What are IT’s responsibilities to improve security as it uses the power of SSO to increase the productivity of its users.
What are the shortcomings of native Windows Event Viewer for auditing file servers to demonstrate compliance, and how to overcome them.
Detect and prevent user logons to stop lateral movement by external attackers as part of the horizontal kill chain.
Eight ways Active Directory fails to control when, where, how, and whether an account can logon. Here's how to fix it with UserLock.
A layered defense can help stop an intrusion kill chain at the perimeter, with the user and at the endpoint.
Logons are the one common activity across nearly all attack patterns. They provide the clearest indication of compromise to protect company data and thwart attacks.
Why security solutions should avoid complexity and disruption to both IT teams and all end-users.
Data security standards within compliance mandates ultimately begin with the login.
Remember those famous hacking scenes from Hollywood & TV? Well if only the various organisations had UserLock and FileAudit. Things would've turned out very differently...
Compromises show themselves as irregularities in user activity in a number of forms. Watching for compromise empowers IT to thwart data breaches.
Managing risk by shifting 'detect and react' to a role that ensures preventative measures are working.
Improve security through logon controls and alerts that limit risk-inducing behavior and limit the potential for compromised credentials.
Rather than blaming users for being human, our infographic shows you how to better protect users' authenticated logins.
A report on the frustrations that IT managers face with multi-factor authentication and how to improve access security without impeding end users or disrupting existing infrastructure.
Do your actions risk your employer's security? Prove it! Free to play, help engage your users and reinforce their user security awareness.
UserLock and FileAudit can help control system access, identify employees on the network and respond to suspicious activity to protect patient data.
UserLock and FileAudit offer strong access control measures, enforced unique user ID and enhanced access monitoring to help address PCI DSS compliance.
Userlock and FileAudit can both help you address the requirements of SOX by allowing you to control and monitor system access and identity.
UserLock and FileAudit protect the network, and sensitive information within, against unwanted access to help your business become ISO 27001 compliant.
UserLock directly addresses two access control baselines of NIST 800-53, AC-9 Previous Logon (Access) Notification and AC-10 Concurrent Session Control.
Our Director of R&D highlights industry best practice and the results of a practical test encrpytion to show how massive file encryption can de detected on a file server.
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
How to take a joined-up approach of better user education and technology solutions to tackle the insider threat.
A rare insight into the views of security experts from a variety of industries on internal security.
Help on whether your organization is compliant with HIPAA, DPA or NHS security regulations.
Help on whether your organization is compliant with PCI, SOX, GLBA and FCA security regulations.
Help on whether your organization is compliant with FISMA, ISO 27001, DBA and Lexcel security regulations.
Why C-level executives should care more about IT security and, in particular, the insider threat.
Research among 1500 workers highlights how much more needs to be done to better identifty and monitor end-users network and file access.
A survey of 500 IT Managers highlights how organizations can strive for a secure network without frustrating the end user and impeding productivity.
We have asked 500 IT decision makers what their immediate plans are to best mitigate the risk of insider threats now.
Research with 500 IT decision makers in the UK and US to better understand their attitudes to insider threat, as well as how well set up they are to manage it.
Bolster your defense against the Insider Threat.
The threat of attack from insiders is real and substantial.
Identify and mitigate the risk from authenticated users.
Securing network access for all authenticated users.
Move from access logging to continuous access monitoring and immediate response.
Disseminate good user behaviour to protect against insider threats.
Reduce the risk of security breaches from the insider threat.
With the limited usefulness of native Windows Tools, FileAudit is a software solution that greatly enhances file and folder access auditing across Windows file servers.
File auditing need not be time-consuming or overwhelming. Learn how IT pros can monitor, audit and secure files and folders intuitively and more easily.
We can affirm categorically that solutions based on windows logon script present too many drawbacks and weaknesses.
Three of the most heavily regulated industries are getting user security compliance badly wrong, but where should you direct your focus?
How context-aware security adds layers of protection to single sign-on services.
Why networks must be set on a 'need-to-know' and 'need-to-use' basis.
Watch a short report on how IS Decisions helps organizations from around the world secure their Microsoft Windows and Active Directory Infrastructure...
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.