Successfully reported this slideshow.
Your SlideShare is downloading. ×

IS Decisions Company Overview. Solutions to secure your Windows Network.

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad

Check these out next

1 of 35 Ad

IS Decisions Company Overview. Solutions to secure your Windows Network.

Download to read offline

IS Decisions address specific but important gaps in managing the security of Microsoft Windows & Active Directory Infrastructures. We are focused on providing solutions to prevent and mitigate insider threat breaches that take security controls beyond what’s available in native Windows functionality.

Our solutions also facilitate/automate many of the often tedious but necessary tasks associated with user access control, access monitoring, file access auditing, server & desktop reporting, patches & remote installations - saving time & money for organizations.

Some figures about IS Decisions. With insider threats emerging as one of the biggest risks to corporate data we’ve seen that more and more organizations are recognizing the need for security solutions to help prevent data breaches from inappropriate user access, intentional or not.

Trust and confidence in IS Decisions solutions has been underlined with several prestigious clients. Customers include some of the most security-sensitive organizations around the world. However our solutions attract any organization that wants to enhance the security of their Windows network.

The 4 key areas where we help organizations are:
1. Prevent Security Breaches
2. Mitigate Insider Threats
3. Get Compliant
4. Quickly Respond in Emergency situations

SMB customers find our solutions to be fast, efficient & affordable. Large Government & Enterprise customers impressed with the ease of use in a high-risk and complex environment.
Find out more at www.isdecisions.com

IS Decisions address specific but important gaps in managing the security of Microsoft Windows & Active Directory Infrastructures. We are focused on providing solutions to prevent and mitigate insider threat breaches that take security controls beyond what’s available in native Windows functionality.

Our solutions also facilitate/automate many of the often tedious but necessary tasks associated with user access control, access monitoring, file access auditing, server & desktop reporting, patches & remote installations - saving time & money for organizations.

Some figures about IS Decisions. With insider threats emerging as one of the biggest risks to corporate data we’ve seen that more and more organizations are recognizing the need for security solutions to help prevent data breaches from inappropriate user access, intentional or not.

Trust and confidence in IS Decisions solutions has been underlined with several prestigious clients. Customers include some of the most security-sensitive organizations around the world. However our solutions attract any organization that wants to enhance the security of their Windows network.

The 4 key areas where we help organizations are:
1. Prevent Security Breaches
2. Mitigate Insider Threats
3. Get Compliant
4. Quickly Respond in Emergency situations

SMB customers find our solutions to be fast, efficient & affordable. Large Government & Enterprise customers impressed with the ease of use in a high-risk and complex environment.
Find out more at www.isdecisions.com

Advertisement
Advertisement

More Related Content

Slideshows for you (20)

Viewers also liked (18)

Advertisement

Similar to IS Decisions Company Overview. Solutions to secure your Windows Network. (20)

More from IS Decisions (15)

Advertisement

Recently uploaded (20)

IS Decisions Company Overview. Solutions to secure your Windows Network.

  1. 1. an introduction to
  2. 2. IS Decisions makes it easy to safeguard and secure your Microsoft Windows and Active Directory infrastructure. Microsoft Certified Partner Silver Application Development
  3. 3. Founded in 2000 Operates in 129countries 3,200+clients 4IT Security solutions Snapshot
  4. 4. Helping Organizations Prevent Security Breaches
  5. 5. Helping Organizations Mitigate Insider Threats
  6. 6. Helping Organizations Ensure regulatory compliance
  7. 7. Helping Organizations Respond to IT emergencies
  8. 8. Innovative simplicity that the modern user expects Easy to use – Easy to install – Easy to protect your Windows Network
  9. 9. UserLock® Access Security far beyond native Windows® features
  10. 10. SECURITY FUNCTION NEEDED TO BE ALERTEDMONITOR REPORTRESTRICT on all session activity throughout network
  11. 11. USERLOCK® OFFERS SECURITY FAR BEYOND NATIVE WINDOWS ® CONTROL
  12. 12. on PC on LAPTOP on TABLET on SMARTPHONE CREATE A CUSTOMIZED ACCESS POLICY AND RESPOND TO ANY SUSPICIOUS BEHAVIOR
  13. 13. SECURE NETWORK ACCESS Restrictions by location – workstation, device Limit or prevent concurrent logins UserLock sets and enforces effective login controls and restrictions (that cannot be achieved in native Windows) on what authenticated users can do. This fine- grained access control helps ensure inappropriate access to company data is no longer a possibility. Restrictions by usage/connection time
  14. 14. WITH RESTRICTIONS SET YOU’RE IN CONTROL
  15. 15. IMMEDIATE RESPONSE TO SUSPICIOUS USER ACCESS Recognize improper user access and respond to risk behavior or access attempts from someone other than the legitimate user Real-Time Monitoring provides the visibility into what users are doing and the ability to take appropriate security measures to alleviate security threats. immediate and remote response to suspicious, disruptive or unusual logon connections should be an integral part of any organizations security policy and risk mitigation strategy
  16. 16. ACCURATE IT FORENSICS IN THE EVENT OF A SECURITY BREACH Accurate, detailed information about who was connected, from which system(s), since what time, for how long etc… UserLock records and archives all access events across the whole Windows Network, giving IT the ability to support accountability, legal investigations and internal trend analysis. Time spent manually monitoring and auditing network access can be significantly reduced (up to 90%), freeing up resources for other critical tasks
  17. 17. RAISE USER SECURITY AWARENESS Messages about legal and contractual implications discourage employees from committing cybercrime or lashing out for a perceived injustice UserLock notifies all users about any access denials on their account Informed employees are an important line of defense. UserLocks’ notification system supports organizations efforts to communicate security policies, increase user security awareness and educate about insider threats.
  18. 18. REDUCE THE ATTACK SURFACE OF YOUR WINDOWS® NETWORK LOGIN SESSION CONTROLS FAR BEYOND NATIVE WINDOWS FEATURES ALLOWS AN ORGANIZATION TO IMPLEMENT AND ENFORCE AN EFFICIENT ACCESS SECURITY POLICY.
  19. 19. MANAGE THE THREAT OF SHARED PASSWORDS PREVENTING CONCURRENT LOGINS REDUCE THE ABILITY OF USERS TO SHARE CREDENTIALS AS IT IMPACTS THEIR OWN ABILITY TO ACCESS THE NETWORK.
  20. 20. STOP ROGUE USERS SEAMLESSLY USING VALID CREDENTIALS ADDRESS NETWORK VULNERABILITY BY MAKING IT IMPOSSIBLE FOR A ROGUE USER TO USE VALID CREDENTIALS AT THE SAME TIME AS THEIR LEGITIMATE OWNER (AND MAKE LEGITIMATE USER ACCOUNTABLE FOR ANY ILLEGITIMATE ACTION THEY TAKE). 39% of data breaches caused by MALICIOUS ATTACKS are the result of negligence, including PASSWORD THEFT. Source: Symantec ® “Malicious Attacks Catching Up & Costing More” 2013
  21. 21. SECURE A BYOD ENVIRONMENT OFFER SECURITY TO A WIRELESS NETWORK AND THE ADOPTION OF BYOD %69of SMBs don’t currently have a security solution for BYOD Source: Voice of IT Survey on Mobile Security (Spiceworks, February 2013)
  22. 22. MITIGATE INSIDER THREATS REDUCE THE RISK OF MALICIOUS INSIDER ACTIVITY WITH IMMEDIATE RESPONSE TO SUSPICIOUS OR DISRUPTIVE BEHAVIOR. 21% of electronic crimes where COMMITTED BY INSIDERS 43% of companies experienced at least one MALICIOUS, DELIBERATE INSIDER INCIDENT in the previous year Source: CERT Insider Threat Center “CyberSecurity Watch Survey” 2012
  23. 23. GET COMPLIANT IMPLEMENT CERT BEST PRACTICES AND ENSURE COMPLIANCE WITH MAJOR REGULATIONS SUCH AS SOX, FISMA, HIPAA
  24. 24. PERFORM ACCURATE IT FORENSICS IN THE EVENT OF AN IT SECURITY BREACH, DETAILED INSIGHTS ON EVERY SESSION ACCESS EVENT SUPPORT IT FORENSICS AND LEGAL INVESTIGATIONS.
  25. 25. DOWNLOAD A FREE FULLY-FUNCTIONAL TRIAL NOW WWW.USERLOCK.COM
  26. 26. FileAudit® Windows® File System Auditing. The Easy Way.
  27. 27. INTUITIVE EASY TO USE& Easy to see what’s happening with company data
  28. 28. real-time ACTIVITY MONITORING > read / write / delete access > file ownership changes > permission modifications
  29. 29. alertsTO FILE AND ACTIVITY Immediately address any inappropriate accesses FOLDER
  30. 30. server CUSTOMIZED INTELLIGENCE file See at a glance what’s happening across multiple Windows servers.
  31. 31. Searchable and secure audit trail to perform accurate IT forensics CENTRALIZATION ARCHIVING&
  32. 32. management USER-SPECIFIC RIGHTS External auditors can easily run reports Non-IT executives can easily monitor their own sensitive data
  33. 33. DOWNLOAD A FREE FULLY-FUNCTIONAL TRIAL NOW WWW.FILEAUDIT.COM
  34. 34. IS Decisions Headquarters Créativité Bâtiment A Technopôle Izarbel 64210 Bidart (FRANCE) Phone: +335 59 41 42 20 Email: info@isdecisions.com Web: www.isdecisions.com IS Decisions China Office 上海市襄阳南路 500 号 1502 室 邮编:200031 Phone: +86 21 54665710 Email: info@isdecisions.com.cn Web: www.isdecisions.com.cn

×