Insights

Boost your knowledge with our research, white papers and thought leadership on some of the biggest security risks that concern Microsoft Windows and Active Directory-based Infrastructure.

Filter by topic:

Sorry no results found with your filters. Please try another search.

Two-Factor Authentication Solution for Windows & RDP Logons

Article

Two-Factor Authentication Solution for Windows & RDP Logons

15 reasons why administrators choose UserLock to enable strong two-factor authentication and contextual access management for all Windows logon, RDP and VPN connections.

4 Key Advantages of Single Sign-On using Windows Active Directory Domain Accounts

Article

4 Key Advantages of Single Sign-On using Windows Active Directory Domain Accounts

With one set of Active Directory credentials to access all cloud resources, UserLock Single Sign-On (SSO) puts the organization firmly back in control of user access.

The Case for Keeping Identity Authentication On Premise

Article

The Case for Keeping Identity Authentication On Premise

The question of whether or not to keep identity authentication on premises is a critical one. Read why this issue is key to the on premise vs. cloud debate.

MFA & Access Management

White Paper

MFA & Access Management

Secure On-Premise Active Directory Identitites For Network, Cloud & Remote Access.

A Guide to Zero Trust for MSPs

White Paper

A Guide to Zero Trust for MSPs

In this Guide to Zero Trust for MSPs, learn how to communicate the value of zero trust to clients and prospects.

Save on Cyber Insurance with MFA and Access Management

Article

Save on Cyber Insurance with MFA and Access Management

Multi-factor authentication (MFA) with access management helps lower your risk profile and reduce cyber insurance premiums.

Implement SSO and MFA

Article

Why On-Premise Active Directory Is the Perfect Foundation to Implement SSO and MFA

SSO and MFA are keys to modern architecture. Together, they allow on-premise Active Directory environments to go hybrid without compromising security. Learn more.

HIPAA Multi Factor Authentication

Article

HIPAA Multi Factor Authentication & Technical Safeguards

With medical data breaches on the rise, HIPAA multi factor authentication, access management and audit controls are a must for healthcare organizations. Learn more.

IAM & Remote Access Security

Article

IAM & Remote Access Security

How to protect remote access to both network and cloud environments with an existing Active Directory environment.

What you should do when two-factor authentication becomes a security requirement

White Paper

What you should do when two-factor authentication becomes a security requirement

A two-factor authentication deployment must be carefully planned to ensure it integrates with your existing environment and protects all assets properly.

Improving Active Directory Security With SSO and MFA

Article

Improving Active Directory Security With SSO and MFA

As users access cloud and network resources, combining SSO and MFA with on-premise Active Directory provides both convenience and security.

Guide: What Is SAML and How Does SAML Work With Active Directory?

Article

Guide: What Is SAML and How Does SAML Work With Active Directory?

Our guide starts with what is SAML, and goes in-depth to explore how SAML works with active directory. Read on to learn more.

Securing Access to On-Premises Microsoft Exchange Server

Article

Securing Access to
On-Premises Microsoft Exchange Server

Need to secure employee access to an on-premises Microsoft Exchange server? Learn what solutions are available to protect exchange access for Active Directory environments.

MFA vs. 2FA vs. 2SV: How to Choose the Right Multi-Factor Authentication

Article

MFA vs. 2FA vs. 2SV: How to Choose the Right Multi-Factor Authentication

What's the difference between MFA, 2FA and 2SV? Learn how to select the type of multi-factor authentication that best fits your needs.

Multifactor Authentication and Compromised Credentials

Infographic

Multifactor Authentication and Compromised Credentials

It's tough to stop security breaches from compromised user logins. Rather than blaming users for being human, MFA and access management helps protect against credential based attacks.

An alternative to ADFS with UserLock SSO

Article

An alternative to ADFS with UserLock SSO

UserLock helps secure on-premises Windows AD Server accounts while providing granular control over MFA, SSO and more. Admins can enforce these policies across all connection types—even those leveraging SAML for secure and simple cloud access.

How Does MFA Help Prevent Ransomware

Article

How Does MFA Help Prevent Ransomware

Ransomware success against an organization is contingent on the scammer's ability to acquire the credentials of accounts within that organization. Multi Factor Authentication (MFA) can decrease the risk of ransomware since it requires additional authentication.

Add UserLock Anywhere To Further Secure Remote Work

Article

Add UserLock Anywhere To Further Secure Remote Work

Users working remotely may not always be connected to the corporate network. UserLock Anywhere enforces multi-factor authentication and access controls to protect this offline domain access.

Privileged Access Management for Windows Active Directory Domains

White Paper

Privileged Access Management for Windows Active Directory Domain

The role of UserLock in PAM to protect any account with privileged access whilst also enhancing the security of all privileged accounts.

Multi-Factor Authentication for Remote Working

Article

Multi-Factor Authentication for Remote Working

When users work remotely, learn how UserLock can continue to secure machine, network and cloud access.

Manage access to Microsoft 365 and Cloud Applications

White Paper

Manage access to Microsoft 365 and Cloud Applications

To manage user access in a hybrid cloud configuration, you can retain Windows Server Active Directory as your identity management solution and extend it to work with Azure Active Directory.

Single Sign-On (SSO) security issues and how to overcome them

Article

Single Sign-On (SSO) security issues and how to overcome them

Single sign-on (SSO) for Active Directory comes with a number of security issues. Learn how to overcome them and achieve both elevated security and productivity.

Strategy in Azure Active Directory

Article

How to Develop a Sound Access Management Strategy in Azure Active Directory

Tips and tricks for improving your Azure Active Directory access-management protocols to help protect sensitive data.

Token2 main use cases and solutions

Article

Hardware-based MFA tokens – Token2 main use cases and solutions

Token2 provides programmable TOTP tokens and USB security keys that can be used as hardware authenticators with UserLock MFA.

NIST 800-53 Compliance

Checklist

NIST 800-171 Compliance

UserLock directly addresses three high-priority security requirements of NIST 800-171, 3.1 Access Control, 3.3 Audit and Accountability and 3.5 Identification and Authentication.

Under a cloud of suspicion

Report

Under a cloud of suspicion

A report that unpicks the perceptions of cloud storage with 300 heads of security, and discovers how SMBs are overcoming these security issues.

Active Directory Access Management

Article

Active Directory Access Management

Access management solutions help secure logins and protect a Windows Active Directory network.

Remote work and IT security: How to secure RDP & VPN sessions?

Article

Remote Work: How to Secure VPN & RDP Sessions?

Remote work poses real cybersecurity problems that endanger sensitive corporate data. Learn how to secure RDP & VPN sessions.

IT Teams Remote Work Stress

Infographic

IT Teams Remote Work Stress

The recent Covid-19 situation has put a lot of pressure and stress on IT Teams. Test yourself and find out how to keep your head above the water.

Access Security Software for CCPA Compliance

Compliance

Access Security Software for CCPA Compliance

Security software to help prove to CCPA regulators you are effectively protecting the access to your customer’s personal data.

Security of Data in the Cloud

Infographic

Security of Data in the Cloud

Cloud data storage is still viewed with fear and skepticism. Learn how to get the productivity benefits from using cloud services and still secure all access to these cloud files.

Overcoming the Cyber Risks of Remote Working

Infographic

Overcoming the Cyber Risks of Remote Working

Remote workers and their negligent behavior pose a great cybersecurity risk. Discover how to secure remote working for Windows Active Directory.

6 Must-Dos when Preparing your Business for Multi-Factor Authentication

Article

6 Must-Dos when Preparing your Business for Multi-Factor Authentication

Whatever the size of your company, here are six key points to remember when preparing for a successful multi-factor deployment.

Why multi-factor or two-factor authentication for Active Directory credentials

Article

Why multi-factor or two-factor authentication for Active Directory credentials

Learn how multi-factor authentication combines two or more factors to create a layered defense that protects the vulnerability of corporate passwords.

MSPs top opportunities

Infographic

MSPs top opportunities

Cloud, security and compliance are three top opportunities for MSPs because of the challenge they represent for SMBs.

Security Far Beyond Active Directory Password Policy

White Paper

Security Far Beyond Active Directory Password Policy

Active Directory passwords are effortlessly compromised. UserLock verifies user credentials beyond password policies to ensure users really are who they say they are.

Information Security advice for Small  AND Medium Business (SMB)

Infographic

Information Security advice for Small AND Medium Business (SMB)

It's no easy feat securing the SMB. Our Infographic highlights 8 SMB-friendly criteria to help choose IT security solutions that achieve maximum impact with minimum effort.

Insider Threat Software - An early indicator to prevent attacks

White Paper

Insider Threat Software - An early indicator to prevent attacks

Abnormal user activity is the key to spotting insider threats. UserLock uniquely empowers IT organizations to leverage the active directory logon as a critical security checkpoint before insiders take action.

8 Security Holes in Windows Group Policy Settings

Infographic

8 Security Holes in Windows Group Policy Settings

Poor logon security can lead to devastating data breaches, but improving the way you manage access is no easy feat — especially if you rely on Windows Active Directory alone. Our infographic highlights 8 security holes in Windows Group Policy Settings and how to fix them.

Auditing File Access in the Cloud

White Paper

Auditing File Access in the Cloud

The functionality you should expect from file auditing, the influence on auditing when you move files to the cloud and how to audit changes to your on-premises and cloud environments.

One Secret to Improving File Security - User Delegation

White Paper

One Secret to Improving File Security - User Delegation

Why delegating auditing to company executives outside of IT makes for more accurate and secure results.

The Challenge to Secure Small and Medium Sized Business (SMB)

White Paper

The Challenge to Secure SMB (Small and Medium Sized Business)

Discover how SMBs and the MSPs serving them can achieve enterprise caliber IT security in terms of focus and effectiveness, but with SMB sensibilities in terms of implementation and use.

Logon Management vs SIEM – The Battle for Threat Detection

White Paper

Logon Management vs SIEM – The Battle for Threat Detection

How does Logon Management with UserLock help detect security threats, when compared to a SIEM solution? UserLock makes the logon itself a scrutinized and protected event. The ability to successfully logon (and remain logged on) becomes more than just whether the right credentials are used.

The Case for Logon Management in Education

White Paper

The Case for Logon Management in Education

Securing access to critical systems and sensitive data in education institutions through better logon management.

How Windows Active Directory is failing user logon security

Report

How Windows Active Directory is failing user logon security

Serious security concerns from your IT peers around the effectiveness of Windows Active Directory to manage employee logons to corporate networks.

File Monitoring - A Data Breach Detection & Prevention Tool

White Paper

File Monitoring - A Data Breach Detection & Prevention Tool

The file system is used as either a target or an asset to further malicious activity– making file access the way to both identify and potentially stop a data breach.

The Role of File Auditing in Compliance

White Paper

The Role of File Auditing in Compliance

How you can use File Auditing to help meet compliance objectives to protect data on Windows Systems and in the cloud.

IT Security in Higher Education – Spotting the Attacker

Article

IT Security in Higher Education – Spotting the Attacker

A leading attack indicator that no malicious insider or external threat actor can get around – the logon.

Least Privilege and the Value of Managing All User Logons

White paper

Least Privilege and the Value of Managing All User Logons

With the rampant misuse of user credentials. least privilege must manage access from all users not just privilege accounts.

Windows File Shares. Managing access to personal data for GDPR compliance

Checklist

Windows File Shares. Managing access to personal data for GDPR compliance

Learn how to protect personal data found on Windows files, folders and file shares. Bolster access security for network, file and folder activity. Get GDPR compliant

Putting a stop to password sharing

Article

Putting a stop to password sharing

By taking steps to put policy, controls, and monitoring in place, you can minimize – if not completely stop – password sharing, and reduce the risk of a security breach.

Single Sign-On: Balancing Power and Responsibility

Article

Single Sign-On: Balancing Power and Responsibility

Single sign-on (SSO) is a powerful tool to increase user productivity. But what are IT's responsibilities to balance that productivity gain with security?

Is Native Windows File Auditing Compliance-Ready?

Article

Is Native Windows File Auditing Compliance-Ready?

What are the shortcomings of native Windows Event Viewer for auditing file servers to demonstrate compliance, and how to overcome them.

Stopping the External Attack Horizontal Kill Chain

White paper

Stopping the External Attack Horizontal Kill Chain

Detect and prevent user logons to stop lateral movement by external attackers as part of the horizontal kill chain.

Active Directory Logon Control : 8 Ways AD fails IT

Article

Ten holes in Windows Login Active Directory (AD) Security

Ten ways Active Directory fails to secure Windows login including no multi factor authentication on Windows computers with AD domain membership.

Using Defense in Depth to stop the Intrusion Kill Chain

Article

Using Defense in Depth to stop the Intrusion Kill Chain

A layered defense can help stop an intrusion kill chain at the perimeter, with the user and at the endpoint.

Key Indicators of Compromise to Prevent a Breach

White paper

Key Indicators of Compromise to Prevent a Breach

Logons are the one common activity across nearly all attack patterns. They provide the clearest indication of compromise to protect company data and thwart attacks.

Disruption: Security's Worst Enemy

Article

Disruption: Security's Worst Enemy

Why security solutions should avoid complexity and disruption to both IT teams and all end-users.

Why compliance starts with the logon

Article

Why compliance starts with the logon

Data security standards within compliance mandates ultimately begin with the login.

Data Breach - What does a Compromise Look Like?

Article

Data Breach - What does a Compromise Look Like?

Compromises show themselves as irregularities in user activity in a number of forms. Watching for compromise empowers IT to thwart data breaches.

Unauthorized Access - The Hidden Costs of Detect and Reach

Article

Unauthorized Access - The Hidden Costs of Detect and Reach

Managing risk by shifting 'detect and react' to a role that ensures preventative measures are working.

Controlling Compromised Credentials - From Careless to Criminal

Article

Controlling Compromised Credentials - From Careless to Criminal

Improve security through logon controls and alerts that limit risk-inducing behavior and limit the potential for compromised credentials.

An alternative to complex, costly and disruptive multi-factor authentication

Article

An alternative to complex, costly and disruptive multi-factor authentication

A report on the frustrations that IT managers face with multi-factor authentication and how to improve access security without impeding end users or disrupting existing infrastructure.

The Weakest Link: A User Security Game

Game

The Weakest Link: A User Security Game

Do your actions risk your employer's security? Prove it! Free to play, help engage your users and reinforce their user security awareness.

HIPAA Compliance

Checklist

HIPAA Compliance

UserLock and FileAudit can help control system access, identify employees on the network and respond to suspicious activity to protect patient data.

PCI DSS Compliance

Checklist

PCI DSS Compliance

UserLock and FileAudit offer strong access control measures, enforced unique user ID and enhanced access monitoring to help address PCI DSS compliance.

Sarbanes Oxley Compliance

Checklist

Sarbanes Oxley Compliance

Userlock and FileAudit can both help you address the requirements of SOX by allowing you to control and monitor system access and identity.

ISO 27001 Compliance

Checklist

ISO 27001 Compliance

UserLock and FileAudit protect the network, and sensitive information within, against unwanted access to help your business become ISO 27001 compliant.

NIST 800-53 Compliance

Checklist

NIST 800-53 Compliance

UserLock directly addresses two access control baselines of NIST 800-53, AC-9 Previous Logon (Access) Notification and AC-10 Concurrent Session Control.

How to detect Ransomware with FileAudit

Blog

How to detect Ransomware with FileAudit

Our Director of R&D highlights industry best practice and the results of a practical test encrpytion to show how massive file encryption can de detected on a file server.

A Study of Insider Threat Personas

Research

A Study of Insider Threat Personas

Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?

12 steps to future proofing your internal security

Infographic

12 steps to future proofing your internal security

How to take a joined-up approach of better user education and technology solutions to tackle the insider threat.

Insider Threat Peer Report

Research

Insider Threat Peer Report

A rare insight into the views of security experts from a variety of industries on internal security.

A Guide to US and UK healthcare user security compliance

Research

A Guide to US and UK healthcare user security compliance

Help on whether your organization is compliant with HIPAA, DPA or NHS security regulations.

A guide to US and UK financial services access security compliance

Research

A guide to US and UK financial services access security compliance

Help on whether your organization is compliant with PCI, SOX, GLBA and FCA security regulations.

A Guide to US and UK user security compliance for legal and law enforcement

Research

A Guide to US and UK user security compliance for legal and law enforcement

Help on whether your organization is compliant with FISMA, ISO 27001, DBA and Lexcel security regulations.

Why Management should care more about IT Security

Article

Why Management should care more about IT Security

Why C-level executives should care more about IT security and, in particular, the insider threat.

ISO 27001/2 Compliance - Information access and user security

Research

ISO 27001/2 Compliance - Information access and user security

Research among 1500 workers highlights how much more needs to be done to better identifty and monitor end-users network and file access.

User Security vs User Productivity. How to strike the right balance.

Research

User Security vs User Productivity. How to strike the right balance.

A survey of 500 IT Managers highlights how organizations can strive for a secure network without frustrating the end user and impeding productivity.

User Security: The future of addressing insider threat

Research

User Security: The future of addressing insider threat

We have asked 500 IT decision makers what their immediate plans are to best mitigate the risk of insider threats now.

Insider Threat Security Manifesto: Beating the threat from within

Research

Insider Threat Security Manifesto: Beating the threat from within

Research with 500 IT decision makers in the UK and US to better understand their attitudes to insider threat, as well as how well set up they are to manage it.

Managing the Insider Threat

Report

Managing the Insider Threat

Bolster your defense against the Insider Threat.

Insider Threat Statistics

Article

Insider Threat Statistics

The threat of attack from insiders is real and substantial.

Insider Threat Mitigation

Article

Insider Threat Mitigation

Identify and mitigate the risk from authenticated users.

Insider Threat Prevention

Article

Insider Threat Prevention

Securing network access for all authenticated users.

Insider Threat Detection & Response

Article

Insider Threat Detection & Response

Move from access logging to continuous access monitoring and immediate response.

Insider Threat Awareness

Article

Insider Threat Awareness

Disseminate good user behaviour to protect against insider threats.

Insider Threat & Zero Trust Security

Article

Insider Threat & Zero Trust Security

Reduce the risk of security breaches from the insider threat.

Windows File Server Auditing

Blog

Windows File Server Auditing

With the limited usefulness of native Windows Tools, FileAudit is a software solution that greatly enhances file and folder access auditing across Windows file servers.

Nine Steps to better File Auditing

Blog

Nine Steps to better File Auditing

File auditing need not be time-consuming or overwhelming. Learn how IT pros can monitor, audit and secure files and folders intuitively and more easily.

Can a Windows Logon Script Control Concurrent Logins

Blog

Can a Windows Logon Script Control Concurrent Logins

We can affirm categorically that solutions based on windows logon script present too many drawbacks and weaknesses.

User security compliance - Where industries are getting compliance badly wrong.

Blog

User security compliance - Where industries are getting compliance badly wrong.

Three of the most heavily regulated industries are getting user security compliance badly wrong, but where should you direct your focus?

Article

Why single sign-on services are now vulnerable

How context-aware security adds layers of protection to single sign-on services.

Why a User Access Control Policy is crucial for your organization

Article

Why a User Access Control Policy is crucial for your organization

Why networks must be set on a 'need-to-know' and 'need-to-use' basis.

IS Decisions featured on TV

Video

IS Decisions featured on TV

Watch a short report on how IS Decisions helps organizations from around the world secure their Microsoft Windows and Active Directory Infrastructure...