SlideShare a Scribd company logo
1 of 2
Download to read offline
CASE STUDY

Bank of Cyprus

reduces security risks

from internal users

with UserLock

Customer

Solution

Bank of Cyprus

UserLock offers the capability to control user
access and react instantly to any related security

Industry
Banking & Financial Services

incident. Disabling concurrent users’ logins,
preventing credential sharing and monitoring
all session activity in real-time helps protect an
organization’s critical assets.

Geography
Europe

Result
The Bank’s IT administrators are empowered
with the tools to help secure network access for

Challenge
Bank of Cyprus needed to enhance
internal users’ network security and
minimize the risk from inside the
organization.

‘‘

One of UserLock’s most important capabilities is the ability
to prevent concurrent logins
and credential sharing between
users. This is especially important at the Bank’s branches
where users are responsible for
financial transactions.

all users. Since deployment in 2010, UserLock
has been expected - and has effectively achieved – to help protect the Bank’s critical assets.

Andreas N.Matheou
Head, Infrastructure Team
Bank of Cyprus

’’
CASE STUDY

BANK OF CYPRUS REDUCES SECURITY RISKS FROM INTERNAL USERS WITH USERLOCK.

The Challenge

How to Control, Manage & Secure
User Access to the Network

As a fast growing organization with
over 4500 employees spread across
Cyprus, United Kingdom, Russia,
Ukraine & Romania, the need to enforce and enhance internal users’
security policy to all its locations
became a primary objective for the
group. Having recognized that security risks from inside the organization
were as important as those from the
external security perimeter, The Bank
of Cyprus set out to improve access security for authorized users and close
existing network security gaps.
To keep user accounts from being
compromised and prevent insider
threats, the IT team identified the
need to disable concurrent users’ logins, prevent credentials from being
shared and enable any response to security incidents to be both timely and
effective.

Some other
UserLock customers
FBI, DEA, UN, Barclays, BNP Paribas, Ministry Interior Saudi Arabia,
Bank of Kuwait, South Wales Police,
NHS, University of Leeds, NATO,
City of Paris, ...

Prior to the implementation of UserLock, no tool was available to help
enforce their Users’ Security Policy
or empower IT to track, record or automatically block any suspicious sessions. “Due to the nature of our organization as a bank it was a real headache
to prevent users from sharing credentials or logging in to more than one

workstation at a time.” said Andreas N.
Matheou, Head, Infrastructure Team.
“We used to manually check and monitor whether the login user was already
logged in to another machine. With no
GUI available all user access needed to
be reviewed and monitored manually,
making it incredibly time consuming to
respond to any security incidents.”

The Solution

Hardening Network Access Security
with UserLock

To help protect the organization’s critical assets, Bank of Cyprus implemented UserLock across the whole
Group, currently managing 3500 user
accounts. “The most important capability is the ability to prevent concurrent
logins and credential sharing between
the users, especially at the Bank’s
branches where users are responsible for
financial transactions” said Andreas.
With UserLock’s intuitive and easy
to use GUI interface, Bank of Cyprus
has the capability to control user access and enforce its customized user
security policy. The IT team can now
effectively limit or stop simultaneous
sessions and monitor/audit all user’s
activity in real-time. Preventing
concurrent logins alleviates the threat
of shared passwords as it impacts users
own ability to access the network.
It also makes it impossible for any
rogue users to use valid credentials at
the same time as their legitimate users
and prevents serious accountability
and non-repudiation issues.

Reducing reaction time to IT Security incidents.
By empowering the team to track,
record and automatically block all
suspicious session, UserLock has also

dramatically reduced the time needed
by the administrators to respond to
related security incidents and day-today operational tasks.
“With UserLock’s real-time access monitoring and alerts, the administrator
can instantly react and perform corrective actions either by remotely locking,
logging off or resetting the appropriate
session. This has added a huge value
to the organizations’ day to day operation.”

“Easy to use, easy to deploy and
great support”
Since 2010 when it was first deployed
at the Bank of Cyprus, UserLock has
been expected to and has effectively
achieved to help protect the Bank’s
critical assets.
“The deployment process was surprisingly fast and easy with no errors. The
intuitive and easy to use GUI interface lets you get right to the business of
hardening network security.
Any time since that we have needed to
contact the support team I would say
the level of service provided was beyond
our expectation – they reacted almost
instantly. Taking into consideration the
overall features and excellent support
of the product I would characterize the
whole engagement with IS Decisions as
outstanding”.

Download a UserLock FREE TRIAL version

WWW.USERLOCK.COM

www.isdecisions.com | info@isdecisions.com
Technopôle IZARBEL - Créaticité Bât. A
BP12 - 64210 Bidart - FRANCE
Phone: +335.59.41.42.20 - Fax: +335.59.41.42.21

More Related Content

What's hot

Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
Greg Cranley
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Lenin Aboagye
 

What's hot (20)

System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
 
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Satark
SatarkSatark
Satark
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
Currency
CurrencyCurrency
Currency
 
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To Empowerment
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
Strategy for Holistic Security
Strategy for Holistic SecurityStrategy for Holistic Security
Strategy for Holistic Security
 
Fintech & Blockchain
Fintech & BlockchainFintech & Blockchain
Fintech & Blockchain
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Internet Security Agent
Internet Security AgentInternet Security Agent
Internet Security Agent
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
Addressing Password Creep
Addressing Password CreepAddressing Password Creep
Addressing Password Creep
 

Similar to Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus

Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
Mani Rai
 
Cs credit card processor
Cs  credit card processorCs  credit card processor
Cs credit card processor
Liora R. Herman
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaper
Hai Nguyen
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstract
Carahsoft
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
IJRAT
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
IJCST - ESRG Journals
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
richard_turner
 

Similar to Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus (20)

Information Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLockInformation Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLock
 
Windows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic DepartmentWindows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic Department
 
Anti-Fraud Datasheet
Anti-Fraud DatasheetAnti-Fraud Datasheet
Anti-Fraud Datasheet
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Cs credit card processor
Cs  credit card processorCs  credit card processor
Cs credit card processor
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaper
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstract
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 

More from IS Decisions

UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical Presentation
IS Decisions
 
IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions
 
Mitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial SectorMitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial Sector
IS Decisions
 

More from IS Decisions (17)

Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
 
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical Presentation
 
IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.
 
Mitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial SectorMitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial Sector
 
Windows Active Directory Security with IS Decisions
Windows Active Directory Security with IS DecisionsWindows Active Directory Security with IS Decisions
Windows Active Directory Security with IS Decisions
 
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheet
 
School Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case StudySchool Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case Study
 
FileAudit Presentation | Windows File System Auditing
FileAudit Presentation  | Windows File System AuditingFileAudit Presentation  | Windows File System Auditing
FileAudit Presentation | Windows File System Auditing
 
UserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows NetworksUserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows Networks
 
FileAudit Datasheet
FileAudit DatasheetFileAudit Datasheet
FileAudit Datasheet
 
UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock Datasheet
 
8 Holes in Windows Login Controls
8 Holes in Windows Login Controls8 Holes in Windows Login Controls
8 Holes in Windows Login Controls
 
RemoteExec Presentation
RemoteExec PresentationRemoteExec Presentation
RemoteExec Presentation
 
IS Decisions in the NUMB3RS
IS Decisions in the NUMB3RSIS Decisions in the NUMB3RS
IS Decisions in the NUMB3RS
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company Presentation
 
WinReporter Presentation
WinReporter PresentationWinReporter Presentation
WinReporter Presentation
 

Recently uploaded

Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 

Recently uploaded (20)

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 

Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus

  • 1. CASE STUDY Bank of Cyprus reduces security risks from internal users with UserLock Customer Solution Bank of Cyprus UserLock offers the capability to control user access and react instantly to any related security Industry Banking & Financial Services incident. Disabling concurrent users’ logins, preventing credential sharing and monitoring all session activity in real-time helps protect an organization’s critical assets. Geography Europe Result The Bank’s IT administrators are empowered with the tools to help secure network access for Challenge Bank of Cyprus needed to enhance internal users’ network security and minimize the risk from inside the organization. ‘‘ One of UserLock’s most important capabilities is the ability to prevent concurrent logins and credential sharing between users. This is especially important at the Bank’s branches where users are responsible for financial transactions. all users. Since deployment in 2010, UserLock has been expected - and has effectively achieved – to help protect the Bank’s critical assets. Andreas N.Matheou Head, Infrastructure Team Bank of Cyprus ’’
  • 2. CASE STUDY BANK OF CYPRUS REDUCES SECURITY RISKS FROM INTERNAL USERS WITH USERLOCK. The Challenge How to Control, Manage & Secure User Access to the Network As a fast growing organization with over 4500 employees spread across Cyprus, United Kingdom, Russia, Ukraine & Romania, the need to enforce and enhance internal users’ security policy to all its locations became a primary objective for the group. Having recognized that security risks from inside the organization were as important as those from the external security perimeter, The Bank of Cyprus set out to improve access security for authorized users and close existing network security gaps. To keep user accounts from being compromised and prevent insider threats, the IT team identified the need to disable concurrent users’ logins, prevent credentials from being shared and enable any response to security incidents to be both timely and effective. Some other UserLock customers FBI, DEA, UN, Barclays, BNP Paribas, Ministry Interior Saudi Arabia, Bank of Kuwait, South Wales Police, NHS, University of Leeds, NATO, City of Paris, ... Prior to the implementation of UserLock, no tool was available to help enforce their Users’ Security Policy or empower IT to track, record or automatically block any suspicious sessions. “Due to the nature of our organization as a bank it was a real headache to prevent users from sharing credentials or logging in to more than one workstation at a time.” said Andreas N. Matheou, Head, Infrastructure Team. “We used to manually check and monitor whether the login user was already logged in to another machine. With no GUI available all user access needed to be reviewed and monitored manually, making it incredibly time consuming to respond to any security incidents.” The Solution Hardening Network Access Security with UserLock To help protect the organization’s critical assets, Bank of Cyprus implemented UserLock across the whole Group, currently managing 3500 user accounts. “The most important capability is the ability to prevent concurrent logins and credential sharing between the users, especially at the Bank’s branches where users are responsible for financial transactions” said Andreas. With UserLock’s intuitive and easy to use GUI interface, Bank of Cyprus has the capability to control user access and enforce its customized user security policy. The IT team can now effectively limit or stop simultaneous sessions and monitor/audit all user’s activity in real-time. Preventing concurrent logins alleviates the threat of shared passwords as it impacts users own ability to access the network. It also makes it impossible for any rogue users to use valid credentials at the same time as their legitimate users and prevents serious accountability and non-repudiation issues. Reducing reaction time to IT Security incidents. By empowering the team to track, record and automatically block all suspicious session, UserLock has also dramatically reduced the time needed by the administrators to respond to related security incidents and day-today operational tasks. “With UserLock’s real-time access monitoring and alerts, the administrator can instantly react and perform corrective actions either by remotely locking, logging off or resetting the appropriate session. This has added a huge value to the organizations’ day to day operation.” “Easy to use, easy to deploy and great support” Since 2010 when it was first deployed at the Bank of Cyprus, UserLock has been expected to and has effectively achieved to help protect the Bank’s critical assets. “The deployment process was surprisingly fast and easy with no errors. The intuitive and easy to use GUI interface lets you get right to the business of hardening network security. Any time since that we have needed to contact the support team I would say the level of service provided was beyond our expectation – they reacted almost instantly. Taking into consideration the overall features and excellent support of the product I would characterize the whole engagement with IS Decisions as outstanding”. Download a UserLock FREE TRIAL version WWW.USERLOCK.COM www.isdecisions.com | info@isdecisions.com Technopôle IZARBEL - Créaticité Bât. A BP12 - 64210 Bidart - FRANCE Phone: +335.59.41.42.20 - Fax: +335.59.41.42.21