Access Management
File Security
Compliance
Other
See all insights
Apply 2FA on Windows AD logins, IIS, VPN, RDP & RD Gateway, Off-network and SaaS connections.
Choose between push notifications, hardware devices, or authenticator apps as MFA methods.
Secure access to cloud apps with SSO combined with MFA and context-aware restrictions.
Monitor, alert, and respond in real time to all user access activity.
Control how users access the network based on machine or device, time, session type or simultaneous connections.
Get centralized auditing across your network and report on all Windows user access events.
Imagine the following scenario: a user is coming up to his workstation and after he correctly entered his username and password, the computer prompts a dialog box saying: «Hello John Smith, you have been authenticated. The last time that your account was successfully logged on was at 2 a.m., from computer such-and-such.»
What if this user recognizes that he had not logged on at that time? That would indicate that someone else had successfully logged on as him and impersonated him. This is one of the most effective ways to detect people impersonating other user accounts, providing your users are reasonably security aware.
That does not exist in Windows although this feature is required for an Information System to comply with major regulatory constraints, including:
UserLock allows notifying all users prior to gaining access to a system with a tailor-made warning message. These messages can for example include:
Share this page:
Select language:
Business privacy policy - User License Agreement - General conditions - Manage your cookies
© IS Decisions