See all insights
UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.
Start a Free Trial
Book a demo
Enable customized, two-factor authentication on Windows logon, RDP and VPN connections.
Set policies to authorize, deny or limit any login (including wireless and remote access), based on contextual factors:
Get real time visibility and insights into all user access. Interact and respond to any session, direct from the console.
A centralized audit for reports on all Active Directory user login events and attempts. Prove regulatory compliance, support forensics and track down threats.
« UserLock offers a level of protection that small, medium and large business should be implementing as part of their security roadmap »
Ricky Magalhaes Information Security Analyst
Watch Short Demos
Active Directory accounts are effortlessly compromised. It only takes a careless employee to share a password or leave a workstation unattended. Even the most careful employee can be exploited and the victim of stolen credentials. Stop uncontrolled and unauthorized access with UserLock, before damage is done.
With full visibility and insight into all Windows sessions, UserLock can interact remotely with any session (open or locked), direct from the console. Administrators can now logoff, lock or reset appropriate settings to manage shared machines, react to forgotten sessions left open, report on working hours, block suspicious behavior...
Many standards are keenly aware of the importance in securing all logons. Requirements exist to ensure the access and usage of data is identifiable, audited and attributed to an individual user. UserLock can both monitor this requirement, as well as stop inappropriate access (read: compliance breach) from ever happening.
Discover all UserLock benefits
30-day full version with no user limits
Simple to manage and intuitive to use, UserLock works alongside your existing Active Directory infrastructure (and investment) to extend, not replace its security. No modifications are made to AD accounts, its structure or its schema.
Fast to deploy, UserLock is installed in minutes on a standard Windows Server.
Accurate and insightful security. UserLock maximizes your chances of stopping a threat before it starts.
AD Group level controls and an automated deployment engine makes implementation easy for larger user bases.
Transparent to the end-user, UserLock protects logons without impeding employee productivity.
« The perfect access security partner for Windows Active Directory environments. »
Read the Review
« The product is simple to install, easy to configure and offers a level of protection that all businesses should be implementing. »
« UserLock is a powerful product that focuses on preventing the internal and external threats related to compromised credentials. »
« UserLock prevents unauthorized access to enterprise systems and networks from external and internal users. »
Read the Report
A proven solution for both small to medium-sized businesses (SMBs) and large organizations, including some of the most regulated and security-conscious in the world.
Review by Bob B.
In a flash, I can control my users’ login experience, find/identify users computers and remote in for support. It’s just always there for me. I can’t imagine working without it now.
Review by Gov't Network Tech
Userlock has been a great tool and helped us tighten up our user security. It's used in conjunction with Active Directory and Group Policy to secure all logon types in the domain.
For Windows, RDP and VPN connections.
Detailed analysis of your users' working hours to better manage and control users' connection times.
Push UserLock updates directly to other applications right when they happen, opening up new automation possibilities.
UserLock can now control access from both Windows and Mac workstations to protect across the whole organization.
Discover how UserLock can help you meet your needs.
The trial version offers:
Release Date : 6/4/2020
Version : UserLock 10.2
What's new in this version ?
Learn more about
Explore Real-Time Insights & Restrictions
Angela steals Joseph Green's credentials from his unattended machine via a ‘rubber ducky’ USB. Whilst the stolen credentials are valid they won't work on Angela's own machine.
Detailed reporting on the working hours for all users on your network.
Windows XP | Windows Server 2003 | Windows Vista | Windows Server 2008 | Windows 7 | Windows Server 2008 R2 | Windows 8 | Windows server 2012 | Windows 8.1 | Windows Server 2012 R2 | Windows 10 (64 bits computers included) | Windows Server 2016
Free number for US & Canada: + 1-800-492-3951
GMT +1: +33 5 59 41 42 20
© IS Decisions