Reviews

Tested and reviewed by leading IT analysts and experts.

Sorry no results found with your filters. Please try another search.

UserLock is reviewed by Expert Insights

Expert Insights

UserLock is reviewed by Expert Insights

"UserLock is a strong user authentication tool for mid-sized organizations and larger enterprises with an on-premises Windows environment. It’s also highly useful for organizations that have a hybrid environment and are struggling to find a platform that offers secure access to on-prem resources as well as those in the cloud."

UserLock is reviewed by 4Sysops

4sysops

UserLock is reviewed by 4Sysops

"In just a few short configuration steps, you can greatly bolster your account logon activity on business-critical servers across a number of technologies in your environment. UserLock's solution makes implementing MFA extremely easy."

UserLock is reviewed by IT Connect

IT Connect

UserLock is reviewed by IT Connect

"Relatively simple to deploy via UserLock, the implementation of MFA on an infrastructure significantly enhances security, especially with the current trend and the boom in remote working."

UserLock Review

James Rankin

UserLock is reviewed by James Rankin

"I found the initial setup very easy and particularly the MFA setup was noticeably painless as well."

UserLock Review

IT Security Guru

UserLock Review 5* - from IT Security Guru

"The perfect access security partner for Windows Active Directory environments."

New. TechGenix UserLock review

TechGenix

New. TechGenix UserLock review

"The product is simple to install, easy to configure and offers a level of protection that all businesses should be implementing."

UserLock - Help Net Security

Help Net Security

UserLock - Help Net Security

"UserLock is a powerful product that focuses on preventing the internal and external threats related to compromised credentials."

Ovum ''On the Radar'' UserLock Report.

OVUM

Ovum "On the Radar" UserLock Report.

"UserLock prevents unauthorized access to enterprise systems and networks from external and internal users."