Insights

Boost your knowledge with our research, white papers and thought leadership on some of the biggest security risks that concern Microsoft Windows and Active Directory-based Infrastructure.

Filter by topic:

Sorry no results found with your filters. Please try another search.

Stopping the Horizontal Kill Chain

White paper

Stopping the Horizontal Kill Chain

Detect and prevent user logons to stop lateral movement by external attackers as part of the horizontal kill chain.

How Windows Active Directory is failing user logon security

Report

How Windows Active Directory is failing user logon security

Serious security concerns from your IT peers around the effectiveness of Windows Active Directory to manage employee logons to corporate networks.

Key Indicators of Compromise

White paper

Key Indicators of Compromise

Logons are the one common activity across nearly all attack patterns. They provide one of the clearest indications of compromise to help protect company data and thwart attacks.

Disruption: Security's Worst Enemy

Article

Disruption: Security's Worst Enemy

Why security solutions should avoid complexity and disruption to both IT teams and all end-users.

Why compliance starts with the logon

Article

Why compliance starts with the logon

Data security standards within compliance mandates ultimately begin with the login.

IS Decisions ruins Hollywood

Video

IS Decisions ruins Hollywood

Remember those famous hacking scenes from Hollywood & TV? Well if only the various organisations had UserLock and FileAudit. Things would've turned out very differently...

Data Breach - What does a Compromise Look Like?

Article

Data Breach - What does a Compromise Look Like?

Compromises show themselves as irregularities in user activity in a number of forms. Watching for compromise empowers IT to thwart data breaches.

Unauthorized Access - The Hidden Costs of Detect and Reach

Article

Unauthorized Access - The Hidden Costs of Detect and Reach

Managing risk by shifting 'detect and react' to a role that ensures preventative measures are working.

Controlling Compromised Credentials - From Careless to Criminal

Article

Controlling Compromised Credentials - From Careless to Criminal

Improve security through logon controls and alerts that limit risk-inducing behavior and limit the potential for compromised credentials.

Security Breaches from Compromised User Logins

Infographic

Security Breaches from Compromised User Logins

Rather than blaming users for being human, our infographic shows you how to better protect users' authenticated logins.

An alternative to complex, costly and disruptive multi-factor authentication

Article

An alternative to complex, costly and disruptive multi-factor authentication

A report on the frustrations that IT managers face with multi-factor authentication and how to improve access security without impeding end users or disrupting existing infrastructure.

The Weakest Link: A User Security Game

Game

The Weakest Link: A User Security Game

Do your actions risk your employer's security? Prove it! Free to play, help engage your users and reinforce their user security awareness.

HIPAA Compliance

Checklist

HIPAA Compliance

UserLock and FileAudit can help control system access, identify employees on the network and respond to suspicious activity to protect patient data.

PCI DSS Compliance

Checklist

PCI DSS Compliance

UserLock and FileAudit offer strong access control measures, enforced unique user ID and enhanced access monitoring to help address PCI DSS compliance.

Sarbanes Oxley Compliance

Checklist

Sarbanes Oxley Compliance

Userlock and FileAudit can both help you address the requirements of SOX by allowing you to control and monitor system access and identity.

ISO 27001 Compliance

Checklist

ISO 27001 Compliance

UserLock and FileAudit protect the network, and sensitive information within, against unwanted access to help your business become ISO 27001 compliant

NIST 800-53 Compliance

Checklist

NIST 800-53 Compliance

UserLock directly addresses two access control baselines of NIST 800-53, AC-9 Previous Logon (Access) Notification and AC-10 Concurrent Session Control. 

How to detect Ransomware with FileAudit

Blog

How to detect Ransomware with FileAudit

Our Director of R&D highlights industry best practice and the results of a practical test encrpytion to show how massive file encryption can de detected on a file server.

A Study of Insider Threat Personas

Research

A Study of Insider Threat Personas

Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?

12 steps to future proofing your internal security

Infographic

12 steps to future proofing your internal security

How to take a joined-up approach of better user education and technology solutions to tackle the insider threat.

Insider Threat Peer Report

Research

Insider Threat Peer Report

A rare insight into the views of security experts from a variety of industries on internal security

A Guide to US and UK healthcare user security compliance

Research

A Guide to US and UK healthcare user security compliance

Help on whether your organization is compliant with HIPAA, DPA or NHS security regulations.

A guide to US and UK financial services access security compliance

Research

A guide to US and UK financial services access security compliance

Help on whether your organization is compliant with PCI, SOX, GLBA and FCA security regulations.

A Guide to US and UK user security compliance for legal and law enforcement

Research

A Guide to US and UK user security compliance for legal and law enforcement

Help on whether your organization is compliant with FISMA, ISO 27001, DBA and Lexcel security regulations.

Why Management should care more about IT Security

Article

Why Management should care more about IT Security

Why C-level executives should care more about IT security and, in particular, the insider threat.

ISO 27001/2 Compliance - Information access and user security

Research

ISO 27001/2 Compliance - Information access and user security

Research among 1500 workers highlights how much more needs to be done to better identifty and monitor end-users network and file access.

User Security vs User Productivity. How to strike the right balance.

Research

User Security vs User Productivity. How to strike the right balance.

A survey of 500 IT Managers highlights how organizations can strive for a secure network without frustrating the end user and impeding productivity.

User Security: The future of addressing insider threat

Research

User Security: The future of addressing insider threat

We have asked 500 IT decision makers what their immediate plans are to best mitigate the risk of insider threats now.

Insider Threat Security Manifesto: Beating the threat from within

Research

Insider Threat Security Manifesto: Beating the threat from within

Research with 500 IT decision makers in the UK and US to better understand their attitudes to insider threat, as well as how well set up they are to manage it.

Managing the Insider Threat

Report

Managing the Insider Threat

Bolster your defense against the Insider Threat.

Insider Threat Statistics

Article

Insider Threat Statistics

The threat of attack from insiders is real and substantial.

Insider Threat Mitigation

Article

Insider Threat Mitigation

Identify and mitigate the risk from authenticated users.

Insider Threat Prevention

Article

Insider Threat Prevention

Securing network access for all authenticated users.

Insider Threat Detection & Response

Article

Insider Threat Detection & Response

Move from access logging to continuous access monitoring and immediate response

Insider Threat Awareness

Article

Insider Threat Awareness

Disseminate good user behaviour to protect against insider threats.

Insider Threat & Zero Trust Security

Article

Insider Threat & Zero Trust Security

Reduce the risk of security breaches from the insider threat.

Windows File Server Auditing

Blog

Windows File Server Auditing

With the limited usefulness of native Windows Tools, FileAudit is a software solution that greatly enhances file and folder access auditing across Windows file servers.

Nine Steps to better File Auditing

Blog

Nine Steps to better File Auditing

File auditing need not be time-consuming or overwhelming. Learn how IT pros can monitor, audit and secure files and folders intuitively and more easily.

Can a Windows Logon Script Control Concurrent Logins

Blog

Can a Windows Logon Script Control Concurrent Logins

We can affirm categorically that solutions based on windows logon script present too many drawbacks and weaknesses

User security compliance - Where industries are getting compliance badly wrong.

Blog

User security compliance - Where industries are getting compliance badly wrong.

Three of the most heavily regulated industries are getting user security compliance badly wrong, but where should you direct your focus?

Article

Why single sign-on services are now vulnerable

How context-aware security adds layers of protection to single sign-on services

Why a User Access Control Policy is crucial for your organization

Article

Why a User Access Control Policy is crucial for your organization

Why networks must be set on a 'need-to-know' and 'need-to-use' basis.

Article

Four steps to ensure your Windows network isn't at risk

Access security and login control may not be the most exciting initiative in the world, but it is an important one.

IS Decisions featured on TV

Video

IS Decisions featured on TV

Watch a short report on how IS Decisions helps organizations from around the world secure their Microsoft Windows and Active Directory Infrastructure…