See all insights
Download as PDF
Whether it’s from exploited users, careless errors, malicious actions or external attacks, your employees’ login credentials are being effortlessly compromised. What’s more, your anti-virus, anti-intrusion, firewall and other technologies are not going to flag anything unusual. Those tools believe that the person accessing your network is exactly who they say they are - an authenticated user with authorized access!
Knowing how prevalent misused credentials are in data breaches, organizations need to better protect access from everyone within a company – not just the privileged users/administrators, because any account with access to data that is sensitive, privileged or otherwise valuable is at risk.
By adding two-factor authentication, contextual restrictions and real-time insight around logons, UserLock helps administrators to secure, monitor and respond to users’ access, even when credentials are compromised.
Furthermore with UserLock, access to any data/resource is now always identifiable and attributed to one individual user. This accountability discourages an insider from acting maliciously and makes all users more careful with their actions.
Verify the identity of all users with strong two-factor authentication (2FA) on Windows logon and RDP connections. Using authenticator applications to generate a time-based one-time password (TOTP), administrators can specify the circumstances under which 2FA is asked.
Restrictions can be established to limit when an account can logon, from which machines, devices or IP addresses, using only approved session types (including Wi-Fi, VPN and IIS) and number of concurrent sessions, helping to reduce the risk of inappropriate use.
Every logon is monitored and tested against existing policies to determine if a logon should be allowed. Full visibility gives insight into any anomalous account behavior that may indicate a potential threat. A centralized audit helps ensure detailed and accurate insights about who was connected, from which system(s), since what time, for how long, etc.
Notify IT and the user themselves of inappropriate logon activity and failed attempts.
Allows IT to interact with a suspect session, to lock the console, log off the user, or even block them from further logons.
Works seamlessly alongside your existing investment in Active Directory. No modifications are made to accounts, structure or schema.
Easily adopted by end-users with the best balance of security and usability.
Fast to deploy, UserLock is installed in minutes on a standard Windows Server.
AD Group level controls and an automated deployment engine makes implementation easy for larger user bases.
Accurate and effective security, UserLock maximizes your chances of stopping a threat before it starts.
Helps expedite and/or schedule certain tasks and execute personalized requests on the information within UserLock.
A UserLock backup server can be installed to guarantee failover.
Integrate the valuable data managed by UserLock, with other solutions to improve overall IT security management.
Supported operating systems include Windows Server 2019 and Windows 10.
Start a free trial
Active Directory required (for workgroups, see the Standalone Terminal Server UserLock server type).
Functional level of forest and domain: Windows Server 2003 or higher.
UserLock supports the following operating systems:
For all information on requirements
IS Decisions is a global software company specializing in Security and Access Management. Trusted by over 3400 organizations, it offers proven solutions for both small to medium-sized businesses (SMBs) and large organizations, including some of the most regulated and security-conscious in the world.
PDF Version - 600 KB
The trial version offers:
Release Date : 9/24/2019
Version : UserLock 10
What's new in this version ?
Free number for US & Canada: + 1-800-492-3951
GMT +1: +33 5 59 41 42 20
© IS Decisions