Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
UserLock®
Access Security far beyond native Windows®
features
IT’S OFTEN
AUTHORIZED USERS
(OR WHOM THEY SHARE THEIR LOGINS)
WHO EXPOSE
CORPORATE DATA
SECURITY FUNCTION NEEDED TO
BE ALERTEDMONITOR REPORTRESTRICT
on all session activity throughout network
USERLOCK®
OFFERS SECURITY
FAR BEYOND
NATIVE WINDOWS
®
CONTROL
USERLOCK
®
IN NUMB3RS
1M+
LICENSES IN USE
ACROSS
100+
COUNTRIES
3,000+
CUSTOMERS
on
PC
on
LAPTOP
on
TABLET
on
SMARTPHONE
CREATE A CUSTOMIZED ACCESS POLICY AND
RESPOND TO ANY SUSPICIOUS BEHAVIOR
HOW
DOES
IT
WORK
ACCESS MANAGEMENT
RESTRICT & CONTROL USER LOGINS
that support your organization’s policies
ACCORDING TO SESSION TYPE
ACCESS MANAGEMENT
IIS
TERMINAL VPN
WIFIWORKSTATION
AND SET BY
ACCESS MANAGEMENT
ORGANIZATIONAL
UNIT
USER USER GROUP
LIMIT OR
PREVENT
CONCURRENT
LOGINS
ACCESS MANAGEMENT
E.G.
Limit users to one
session at a time
RESTRICT
WORKSTATION
ACCESS
ACCESS MANAGEMENT
E.G.
Limit users to
their own device
SET
TIME
RESTRICTION
ACCESS MANAGEMENT
E.G.
Avoid connections
outside of
working hours
SET
TIME
QUOTA
ACCESS MANAGEMENT
E.G.
Enforce daily
connection
time quotas
ACCESS MANAGEMENT
WITH RESTRICTIONS SET
YOU’RE IN CONTROL
ACCESS MONITORING
& INTELLIGENCE
USERLOCK
®
EMPOWERS IT
to track, record and automatically
block all suspicious sessions
MONITOR
IN
REAL-TIME
ACCESS MONITORING
Track who is connected,
from which system,
since what time,
for how long,
etc.
RECEIVE
ALERTS
&
INSTANTLY
RESPOND
ACCESS MONITORING
This immediate response reduces
the risk of
malicious
insider
activit...
REPORT
DETAILED
INSIGHTS
ACCESS MONITORING
To support IT forensics
and legal investigations.
RAISING
USER
SECURITY
AWARENESS
SECURITY AWARENESS
YOU NEED TO
EDUCATE
DIRECTLY END-USERS
ABOUT
INSIDER THREATS
SECURITY AWARENESS
PASSWORDS ARE LIKE UNDERWEAR
Change yours
often.
Don’t share them
with friends.
The longer,
The better....
SECURITY AWARENESS
COMMUNICATE
POLICIES THROUGH A
NOTIFICATION SYSTEM
.
SECURITY AWARENESS
POWERFUL
SECURITY
FOR
YOUR
NETWORK
USERLOCK BENEFITS
REDUCE THE ATTACK SURFACE
OF YOUR WINDOWS®
NETWORK
LOGIN SESSION CONTROLS FAR BEYOND NATIVE WINDOWS FEAT...
USERLOCK BENEFITS
MANAGE THE THREAT
OF SHARED PASSWORDS
PREVENTING CONCURRENT LOGINS REDUCE THE ABILITY OF USERS TO SHARE
...
USERLOCK BENEFITS
STOP ROGUE USERS SEAMLESSLY
USING VALID CREDENTIALS
ADDRESS NETWORK VULNERABILITY BY MAKING IT IMPOSSIBL...
USERLOCK BENEFITS
SECURE A BYOD ENVIRONMENT
OFFER SECURITY TO A WIRELESS NETWORK AND THE ADOPTION OF BYOD
%69of SMBs don’t...
USERLOCK BENEFITS
MITIGATE INSIDER THREATS
REDUCE THE RISK OF MALICIOUS INSIDER ACTIVITY WITH
IMMEDIATE RESPONSE TO SUSPIC...
USERLOCK BENEFITS
GET COMPLIANT
IMPLEMENT CERT BEST PRACTICES AND ENSURE COMPLIANCE WITH
MAJOR REGULATIONS SUCH AS SOX, FI...
USERLOCK BENEFITS
PERFORM ACCURATE IT FORENSICS
IN THE EVENT OF AN IT SECURITY BREACH, DETAILED INSIGHTS ON EVERY
SESSION ...
WHAT’S
MORE
EASE OF USE
AND
ENTERPRISE
VALUE
WHAT’S MORE
LAUNCH COMMANDS
FROM THE CONSOLE
Saves time when managing and
responding to events
WHAT’S MORE
REMOTE SESSION
ADMINISTRATION
Respond quickly to emergencies no
matter where you are.
WHAT’S MORE
POWERSHELL
INTEGRATION
Helps expedite certain tasks and
execute personalized requests on the
information withi...
WHAT’S MORE
EASY TO INSTALL,
EASY TO USE.
Installed in minutes, an intuitive GUI
features at-a-glance analytics and
numero...
WHAT’S MORE
DELEGATE
ADMINISTRATION
This helps the delegation of certain
tasks and helps to diminish IT workload!
WHAT’S MORE
PUBLIC & FULLY
DOCUMENTED API
Utilize data with other platforms
to improve overall IT security
management.
WHAT’S MORE
CERTIFICATION &
COMPLIANCE
Microsoft-certified for compliance &
support with Windows Server 2012 and
Windows 8.
WHAT’S MORE
BACKUP
SERVER
A UserLock backup server can be
installed to guarantee failover.
DOWNLOAD
A FREE FULLY-FUNCTIONAL TRIAL
NOW
WWW.USERLOCK.COM
UserLock Presentation | Access Security for Windows Networks
Upcoming SlideShare
Loading in …5
×

UserLock Presentation | Access Security for Windows Networks

3,444 views

Published on

UserLock is a unique enterprise software solution that sets and enforces a customized User Access Policy. Deliver a new level of security for your Windows & Active Directory networks.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

UserLock Presentation | Access Security for Windows Networks

  1. 1. UserLock® Access Security far beyond native Windows® features
  2. 2. IT’S OFTEN AUTHORIZED USERS (OR WHOM THEY SHARE THEIR LOGINS) WHO EXPOSE CORPORATE DATA
  3. 3. SECURITY FUNCTION NEEDED TO BE ALERTEDMONITOR REPORTRESTRICT on all session activity throughout network
  4. 4. USERLOCK® OFFERS SECURITY FAR BEYOND NATIVE WINDOWS ® CONTROL
  5. 5. USERLOCK ® IN NUMB3RS 1M+ LICENSES IN USE ACROSS 100+ COUNTRIES 3,000+ CUSTOMERS
  6. 6. on PC on LAPTOP on TABLET on SMARTPHONE CREATE A CUSTOMIZED ACCESS POLICY AND RESPOND TO ANY SUSPICIOUS BEHAVIOR
  7. 7. HOW DOES IT WORK
  8. 8. ACCESS MANAGEMENT RESTRICT & CONTROL USER LOGINS that support your organization’s policies
  9. 9. ACCORDING TO SESSION TYPE ACCESS MANAGEMENT IIS TERMINAL VPN WIFIWORKSTATION
  10. 10. AND SET BY ACCESS MANAGEMENT ORGANIZATIONAL UNIT USER USER GROUP
  11. 11. LIMIT OR PREVENT CONCURRENT LOGINS ACCESS MANAGEMENT E.G. Limit users to one session at a time
  12. 12. RESTRICT WORKSTATION ACCESS ACCESS MANAGEMENT E.G. Limit users to their own device
  13. 13. SET TIME RESTRICTION ACCESS MANAGEMENT E.G. Avoid connections outside of working hours
  14. 14. SET TIME QUOTA ACCESS MANAGEMENT E.G. Enforce daily connection time quotas
  15. 15. ACCESS MANAGEMENT WITH RESTRICTIONS SET YOU’RE IN CONTROL
  16. 16. ACCESS MONITORING & INTELLIGENCE USERLOCK ® EMPOWERS IT to track, record and automatically block all suspicious sessions
  17. 17. MONITOR IN REAL-TIME ACCESS MONITORING Track who is connected, from which system, since what time, for how long, etc.
  18. 18. RECEIVE ALERTS & INSTANTLY RESPOND ACCESS MONITORING This immediate response reduces the risk of malicious insider activity.
  19. 19. REPORT DETAILED INSIGHTS ACCESS MONITORING To support IT forensics and legal investigations.
  20. 20. RAISING USER SECURITY AWARENESS
  21. 21. SECURITY AWARENESS YOU NEED TO EDUCATE DIRECTLY END-USERS ABOUT INSIDER THREATS
  22. 22. SECURITY AWARENESS PASSWORDS ARE LIKE UNDERWEAR Change yours often. Don’t share them with friends. The longer, The better. Be mysterious. Don’t leave yours lying around.
  23. 23. SECURITY AWARENESS COMMUNICATE POLICIES THROUGH A NOTIFICATION SYSTEM .
  24. 24. SECURITY AWARENESS
  25. 25. POWERFUL SECURITY FOR YOUR NETWORK
  26. 26. USERLOCK BENEFITS REDUCE THE ATTACK SURFACE OF YOUR WINDOWS® NETWORK LOGIN SESSION CONTROLS FAR BEYOND NATIVE WINDOWS FEATURES ALLOWS AN ORGANIZATION TO IMPLEMENT AND ENFORCE AN EFFICIENT ACCESS SECURITY POLICY.
  27. 27. USERLOCK BENEFITS MANAGE THE THREAT OF SHARED PASSWORDS PREVENTING CONCURRENT LOGINS REDUCE THE ABILITY OF USERS TO SHARE CREDENTIALS AS IT IMPACTS THEIR OWN ABILITY TO ACCESS THE NETWORK.
  28. 28. USERLOCK BENEFITS STOP ROGUE USERS SEAMLESSLY USING VALID CREDENTIALS ADDRESS NETWORK VULNERABILITY BY MAKING IT IMPOSSIBLE FOR A ROGUE USER TO USE VALID CREDENTIALS AT THE SAME TIME AS THEIR LEGITIMATE OWNER (AND MAKE LEGITIMATE USER ACCOUNTABLE FOR ANY ILLEGITIMATE ACTION THEY TAKE). 39% of data breaches caused by MALICIOUS ATTACKS are the result of negligence, including PASSWORD THEFT. Source: Symantec ® “Malicious Attacks Catching Up & Costing More” 2013
  29. 29. USERLOCK BENEFITS SECURE A BYOD ENVIRONMENT OFFER SECURITY TO A WIRELESS NETWORK AND THE ADOPTION OF BYOD %69of SMBs don’t currently have a security solution for BYOD Source: Voice of IT Survey on Mobile Security (Spiceworks, February 2013)
  30. 30. USERLOCK BENEFITS MITIGATE INSIDER THREATS REDUCE THE RISK OF MALICIOUS INSIDER ACTIVITY WITH IMMEDIATE RESPONSE TO SUSPICIOUS OR DISRUPTIVE BEHAVIOR. 21% of electronic crimes where COMMITTED BY INSIDERS 43% of companies experienced at least one MALICIOUS, DELIBERATE INSIDER INCIDENT in the previous year Source: CERT Insider Threat Center “CyberSecurity Watch Survey” 2012
  31. 31. USERLOCK BENEFITS GET COMPLIANT IMPLEMENT CERT BEST PRACTICES AND ENSURE COMPLIANCE WITH MAJOR REGULATIONS SUCH AS SOX, FISMA, HIPAA
  32. 32. USERLOCK BENEFITS PERFORM ACCURATE IT FORENSICS IN THE EVENT OF AN IT SECURITY BREACH, DETAILED INSIGHTS ON EVERY SESSION ACCESS EVENT SUPPORT IT FORENSICS AND LEGAL INVESTIGATIONS.
  33. 33. WHAT’S MORE EASE OF USE AND ENTERPRISE VALUE
  34. 34. WHAT’S MORE LAUNCH COMMANDS FROM THE CONSOLE Saves time when managing and responding to events
  35. 35. WHAT’S MORE REMOTE SESSION ADMINISTRATION Respond quickly to emergencies no matter where you are.
  36. 36. WHAT’S MORE POWERSHELL INTEGRATION Helps expedite certain tasks and execute personalized requests on the information within UserLock.
  37. 37. WHAT’S MORE EASY TO INSTALL, EASY TO USE. Installed in minutes, an intuitive GUI features at-a-glance analytics and numerous personalization options.
  38. 38. WHAT’S MORE DELEGATE ADMINISTRATION This helps the delegation of certain tasks and helps to diminish IT workload!
  39. 39. WHAT’S MORE PUBLIC & FULLY DOCUMENTED API Utilize data with other platforms to improve overall IT security management.
  40. 40. WHAT’S MORE CERTIFICATION & COMPLIANCE Microsoft-certified for compliance & support with Windows Server 2012 and Windows 8.
  41. 41. WHAT’S MORE BACKUP SERVER A UserLock backup server can be installed to guarantee failover.
  42. 42. DOWNLOAD A FREE FULLY-FUNCTIONAL TRIAL NOW WWW.USERLOCK.COM

×