SlideShare a Scribd company logo
UserLock
®
Access Security far beyond native Windows®
features
Create a customized access policy and respond to any suspicious
behavior on PC, laptop, tablet or smartphone.
Whether you’re just getting started with a user access policy or looking to
advance your existing login controls, UserLock includes all of the essential
functionality to protect your Windows-based network and corporate data.
The challenge
IT administrators spend a lot of time and effort protecting their Windows and Active Directory
networks from external attacks. However, one of the greatest risks to corporate data is the
insider threat – when authorized users share their login details, log on from places or during
times that are not permitted, or access the network from unauthorized personal devices, such
as home computers and smartphones. Native Windows controls neither prohibit concurrent
logins nor provide workable monitoring and access intelligence.
The solution
IS Decisions’ flagship product, UserLock, protects the Windows-based network and all of
the data contained within by restricting user logons according to customized user access
policies. Because logins are the first line of access — and defense — in a network, UserLock
provides a necessary security function in allowing IT to monitor, restrict, be alerted and run
reports on all session activity throughout the network, including Wi-Fi and VPN sessions.
Key Benefits
Efficiently mitigate insider threat and res-
pond to suspicious or disruptive behavior
Alleviate the threat of shared passwords
within an organization
Perform accurate IT forensics in the event
of an IT security breach
Enforce compliance with major regulations
such as SOX, FISMA, HIPAA…
Control Wi-Fi sessions for secure BYOD
environments
Reduce the attack surface of a Windows
network infrastructure
Raise User Security Awareness
About IS Decisions
IS Decisions is a global software company specializing in Security & Access Management solutions for Microsoft Windows and Active Directory.
More than 3,000 customers around the world rely on IS Decisions software and include:
UserLock
®
Access Security far beyond native Windows®
features
Access Management
With UserLock, IT can set and enforce login control based on
multiple criteria that support an organization’s policies. Allow res-
trictions to be set according to user, user group, or organizational
unit and according to session type (workstation, terminal, interac-
tive, Internet Information Services, Wi-Fi and VPN).
Restrict & Control User Access
This comprehensive matrix of access rules enables IT to restrict
users to their own workstation or device
(including personal devices), IP range,
department, floor or building.
In addition time restrictions can be set
defined by working hours, maximum
session times and daily, weekly or mon-
thly time connection quotas.
Limit or Prevent Concurrent Logins
This makes it impossible for a rogue user
to use valid credentials at the same time
as their legitimate owner, decreases the
likelihood of user sharing passwords as it impacts their own ability
to access the network and prevents serious accountability and
non-repudiation issues.
Access Monitoring & Intelligence
With restrictions set, UserLock empowers IT to track, record and
automatically block all inappropriate or suspicious sessions.
Real-Time Monitoring, Alerts & Responses
UserLock continuously monitors all login and session events,
alerting IT of any suspicious or disruptive behavior so they can
instantly react with appropriate measures (E.g. remotely close or
lock user sessions or the shutdown of specific workstations). This
immediate response reduces the risk of
malicious insider activity.
Tracking & Reporting
By recording all access events, UserLock
offers comprehensive reports and de-
tailed insights to support IT Forensics
and legal investigations. If an IT security
breach does occur, accurate information
is available about who was connected,
from which system(s), since what
time, for how long, etc...
Ease of Use & Enterprise Value
Fast to deploy, UserLock is installed in minutes on a standard
Windows Server.
Easy setup
Respond quickly to emergencies no matter where you are.
Remote Session Administration
A UserLock backup server can be installed to guarantee failover.
Backup
Helps expedite certain tasks and execute personalized requests on
the information within UserLock.
PowerShell Integration
No need to navigate out of the console. Saves time when
managing and responding to events.
Launch Commands direct from the Console
The GUI features intuitive tabbed navigation, at-a-glance analytics
and several personalization options.
Intuitive & Easy to use
Microsoft-certified for compliance & support with Windows
Server 2012 and Windows 8.
Certification & Compliance
Specified users can view and manage sessions without access to
more critical settings.
Delegate Administration
Integrate the valuable data managed by UserLock, with other
platforms to improve overall IT security management.
Public & Fully documented API
www.isdecisions.com | info@isdecisions.com
Technopôle IZARBEL - Créaticité Bât. A
BP12 - 64210 Bidart - FRANCE
Phone: +335.59.41.42.20 - Fax: +335.59.41.42.21

More Related Content

What's hot

Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
SHIVA101531
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
KATHEESKUMAR S
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
SupriyaGaikwad28
 
System security
System securitySystem security
System security
ReachLocal Services India
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
Masudur Rahman
 
XP in Quarantine - Isolate and Protect Your Mission Critical Systems
XP in Quarantine - Isolate and Protect Your Mission Critical SystemsXP in Quarantine - Isolate and Protect Your Mission Critical Systems
XP in Quarantine - Isolate and Protect Your Mission Critical Systems
Unisys Corporation
 
Information security
Information security Information security
Information security
razendar79
 
Unit4 next
Unit4 nextUnit4 next
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
Desmond Devendran
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
Daryl Conson
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
Satya P. Joshi
 
06. security concept
06. security concept06. security concept
06. security concept
Muhammad Ahad
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
Cloud security
Cloud securityCloud security
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016
Annie Cute
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
Uditha Bandara Wijerathna
 

What's hot (20)

Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
System security
System securitySystem security
System security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
XP in Quarantine - Isolate and Protect Your Mission Critical Systems
XP in Quarantine - Isolate and Protect Your Mission Critical SystemsXP in Quarantine - Isolate and Protect Your Mission Critical Systems
XP in Quarantine - Isolate and Protect Your Mission Critical Systems
 
Information security
Information security Information security
Information security
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
06. security concept
06. security concept06. security concept
06. security concept
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Cloud security
Cloud securityCloud security
Cloud security
 
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 

Viewers also liked

Tom atoh 1
Tom atoh 1Tom atoh 1
Tom atoh 1
pameymati
 
Fluida
FluidaFluida
Fluida
jull_lie
 
dotAC: Exploring the Uk Research Landscape
dotAC: Exploring the Uk Research LandscapedotAC: Exploring the Uk Research Landscape
dotAC: Exploring the Uk Research Landscape
ngibbins
 
Arboles
Arboles Arboles
10 falsos mitos sobre el cambio climático
10 falsos mitos sobre el cambio climático10 falsos mitos sobre el cambio climático
10 falsos mitos sobre el cambio climático
PurificacionPirizBiologia
 
Actividad 4
Actividad 4Actividad 4
Actividad 4
adrii15
 
Med lineplus
Med lineplusMed lineplus
Med lineplus
erodriguez2309
 
Jacksons report
Jacksons reportJacksons report
Jacksons report
jmsutherland
 
Racons de llengua
Racons de llenguaRacons de llengua
Racons de llengua
nortiz3
 
Menu y Carta
Menu y  CartaMenu y  Carta
Menu y Carta
Lokittha
 
S Ta R Chart Report
S Ta R Chart ReportS Ta R Chart Report
S Ta R Chart Report
denisedaysmith
 
Mon Poor Al Medj'kammer
Mon Poor Al Medj'kammerMon Poor Al Medj'kammer
Mon Poor Al Medj'kammer
Andrew Voyce
 
Genre powerpoint
Genre powerpointGenre powerpoint
Genre powerpoint
ewaszolek
 
Shake para eliminar a fome
Shake para eliminar a fomeShake para eliminar a fome
Shake para eliminar a fome
Shake de Chia
 
Manifestation
Manifestation Manifestation
Manifestation
S H
 
Talk about myself fhad no name
Talk about myself fhad no nameTalk about myself fhad no name
Talk about myself fhad no name
Scott Dagilis
 
Assistive technology webquest
Assistive technology webquestAssistive technology webquest
Assistive technology webquest
stwelch
 
Shake para emagrecer
Shake para emagrecerShake para emagrecer
Shake para emagrecer
Shake de Chia
 
Concept presentatie
Concept presentatieConcept presentatie
Concept presentatieScholtes
 

Viewers also liked (20)

Tom atoh 1
Tom atoh 1Tom atoh 1
Tom atoh 1
 
Fluida
FluidaFluida
Fluida
 
dotAC: Exploring the Uk Research Landscape
dotAC: Exploring the Uk Research LandscapedotAC: Exploring the Uk Research Landscape
dotAC: Exploring the Uk Research Landscape
 
Arboles
Arboles Arboles
Arboles
 
10 falsos mitos sobre el cambio climático
10 falsos mitos sobre el cambio climático10 falsos mitos sobre el cambio climático
10 falsos mitos sobre el cambio climático
 
Actividad 4
Actividad 4Actividad 4
Actividad 4
 
Med lineplus
Med lineplusMed lineplus
Med lineplus
 
Jacksons report
Jacksons reportJacksons report
Jacksons report
 
Racons de llengua
Racons de llenguaRacons de llengua
Racons de llengua
 
Menu y Carta
Menu y  CartaMenu y  Carta
Menu y Carta
 
S Ta R Chart Report
S Ta R Chart ReportS Ta R Chart Report
S Ta R Chart Report
 
8-1
8-18-1
8-1
 
Mon Poor Al Medj'kammer
Mon Poor Al Medj'kammerMon Poor Al Medj'kammer
Mon Poor Al Medj'kammer
 
Genre powerpoint
Genre powerpointGenre powerpoint
Genre powerpoint
 
Shake para eliminar a fome
Shake para eliminar a fomeShake para eliminar a fome
Shake para eliminar a fome
 
Manifestation
Manifestation Manifestation
Manifestation
 
Talk about myself fhad no name
Talk about myself fhad no nameTalk about myself fhad no name
Talk about myself fhad no name
 
Assistive technology webquest
Assistive technology webquestAssistive technology webquest
Assistive technology webquest
 
Shake para emagrecer
Shake para emagrecerShake para emagrecer
Shake para emagrecer
 
Concept presentatie
Concept presentatieConcept presentatie
Concept presentatie
 

Similar to UserLock Datasheet

IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
Joseph Yosi Margalit
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
JoTechies
 
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical Presentation
IS Decisions
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
Juan Ignacio Oller Aznar
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile security
J Hartig
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
Teemu Tiainen
 
fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
fortigate-200f-series (1).pdffortigate-200f-series (1).pdffortigate-200f-series (1).pdffortigate-200f-series (1).pdf
fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
ChristianSilva166877
 
What are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdfWhat are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdf
IT AMC Support Dubai - Techno Edge Systems LLC
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
William hendric
 
Security curator presentation_eng
Security curator presentation_engSecurity curator presentation_eng
Security curator presentation_eng
atompark2
 
Network security
Network securityNetwork security
Network security
Pooja Dewangan
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
Mechsoft Technologies LLC
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
Plain Concepts
 
What goes into managed security services
What goes into managed security servicesWhat goes into managed security services
What goes into managed security services
Phreedom Technologies
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
isidro luna beltran
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University project
Up2Universe
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
Mohammad512578
 

Similar to UserLock Datasheet (20)

IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018Microsoft Intune - Global Azure Bootcamp 2018
Microsoft Intune - Global Azure Bootcamp 2018
 
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical Presentation
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile security
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
fortigate-200f-series (1).pdffortigate-200f-series (1).pdffortigate-200f-series (1).pdffortigate-200f-series (1).pdf
fortigate-200f-series (1).pdffortigate-200f-series (1).pdf
 
What are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdfWhat are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdf
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Security curator presentation_eng
Security curator presentation_engSecurity curator presentation_eng
Security curator presentation_eng
 
Network security
Network securityNetwork security
Network security
 
IT security solutions
IT security solutionsIT security solutions
IT security solutions
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
What goes into managed security services
What goes into managed security servicesWhat goes into managed security services
What goes into managed security services
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University project
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 

More from IS Decisions

Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
IS Decisions
 
Mitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial SectorMitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial Sector
IS Decisions
 
Windows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic DepartmentWindows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic Department
IS Decisions
 
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of CyprusRisk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
IS Decisions
 
Windows Active Directory Security with IS Decisions
Windows Active Directory Security with IS DecisionsWindows Active Directory Security with IS Decisions
Windows Active Directory Security with IS Decisions
IS Decisions
 
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
IS Decisions
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheet
IS Decisions
 
School Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case StudySchool Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case Study
IS Decisions
 
Information Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLockInformation Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLock
IS Decisions
 
FileAudit Presentation | Windows File System Auditing
FileAudit Presentation  | Windows File System AuditingFileAudit Presentation  | Windows File System Auditing
FileAudit Presentation | Windows File System Auditing
IS Decisions
 
UserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows NetworksUserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows Networks
IS Decisions
 
8 Holes in Windows Login Controls
8 Holes in Windows Login Controls8 Holes in Windows Login Controls
8 Holes in Windows Login Controls
IS Decisions
 
RemoteExec Presentation
RemoteExec PresentationRemoteExec Presentation
RemoteExec Presentation
IS Decisions
 
IS Decisions in the NUMB3RS
IS Decisions in the NUMB3RSIS Decisions in the NUMB3RS
IS Decisions in the NUMB3RS
IS Decisions
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company Presentation
IS Decisions
 
WinReporter Presentation
WinReporter PresentationWinReporter Presentation
WinReporter Presentation
IS Decisions
 

More from IS Decisions (16)

Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
 
Mitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial SectorMitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial Sector
 
Windows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic DepartmentWindows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic Department
 
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of CyprusRisk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
 
Windows Active Directory Security with IS Decisions
Windows Active Directory Security with IS DecisionsWindows Active Directory Security with IS Decisions
Windows Active Directory Security with IS Decisions
 
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...Oklahoma City Public Schools stops users sharing Windows Network Login with U...
Oklahoma City Public Schools stops users sharing Windows Network Login with U...
 
RemoteExec DataSheet
RemoteExec DataSheetRemoteExec DataSheet
RemoteExec DataSheet
 
School Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case StudySchool Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case Study
 
Information Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLockInformation Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLock
 
FileAudit Presentation | Windows File System Auditing
FileAudit Presentation  | Windows File System AuditingFileAudit Presentation  | Windows File System Auditing
FileAudit Presentation | Windows File System Auditing
 
UserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows NetworksUserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows Networks
 
8 Holes in Windows Login Controls
8 Holes in Windows Login Controls8 Holes in Windows Login Controls
8 Holes in Windows Login Controls
 
RemoteExec Presentation
RemoteExec PresentationRemoteExec Presentation
RemoteExec Presentation
 
IS Decisions in the NUMB3RS
IS Decisions in the NUMB3RSIS Decisions in the NUMB3RS
IS Decisions in the NUMB3RS
 
IS Decisions Company Presentation
IS Decisions Company PresentationIS Decisions Company Presentation
IS Decisions Company Presentation
 
WinReporter Presentation
WinReporter PresentationWinReporter Presentation
WinReporter Presentation
 

Recently uploaded

AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 

Recently uploaded (20)

AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 

UserLock Datasheet

  • 1. UserLock ® Access Security far beyond native Windows® features Create a customized access policy and respond to any suspicious behavior on PC, laptop, tablet or smartphone. Whether you’re just getting started with a user access policy or looking to advance your existing login controls, UserLock includes all of the essential functionality to protect your Windows-based network and corporate data. The challenge IT administrators spend a lot of time and effort protecting their Windows and Active Directory networks from external attacks. However, one of the greatest risks to corporate data is the insider threat – when authorized users share their login details, log on from places or during times that are not permitted, or access the network from unauthorized personal devices, such as home computers and smartphones. Native Windows controls neither prohibit concurrent logins nor provide workable monitoring and access intelligence. The solution IS Decisions’ flagship product, UserLock, protects the Windows-based network and all of the data contained within by restricting user logons according to customized user access policies. Because logins are the first line of access — and defense — in a network, UserLock provides a necessary security function in allowing IT to monitor, restrict, be alerted and run reports on all session activity throughout the network, including Wi-Fi and VPN sessions. Key Benefits Efficiently mitigate insider threat and res- pond to suspicious or disruptive behavior Alleviate the threat of shared passwords within an organization Perform accurate IT forensics in the event of an IT security breach Enforce compliance with major regulations such as SOX, FISMA, HIPAA… Control Wi-Fi sessions for secure BYOD environments Reduce the attack surface of a Windows network infrastructure Raise User Security Awareness About IS Decisions IS Decisions is a global software company specializing in Security & Access Management solutions for Microsoft Windows and Active Directory. More than 3,000 customers around the world rely on IS Decisions software and include:
  • 2. UserLock ® Access Security far beyond native Windows® features Access Management With UserLock, IT can set and enforce login control based on multiple criteria that support an organization’s policies. Allow res- trictions to be set according to user, user group, or organizational unit and according to session type (workstation, terminal, interac- tive, Internet Information Services, Wi-Fi and VPN). Restrict & Control User Access This comprehensive matrix of access rules enables IT to restrict users to their own workstation or device (including personal devices), IP range, department, floor or building. In addition time restrictions can be set defined by working hours, maximum session times and daily, weekly or mon- thly time connection quotas. Limit or Prevent Concurrent Logins This makes it impossible for a rogue user to use valid credentials at the same time as their legitimate owner, decreases the likelihood of user sharing passwords as it impacts their own ability to access the network and prevents serious accountability and non-repudiation issues. Access Monitoring & Intelligence With restrictions set, UserLock empowers IT to track, record and automatically block all inappropriate or suspicious sessions. Real-Time Monitoring, Alerts & Responses UserLock continuously monitors all login and session events, alerting IT of any suspicious or disruptive behavior so they can instantly react with appropriate measures (E.g. remotely close or lock user sessions or the shutdown of specific workstations). This immediate response reduces the risk of malicious insider activity. Tracking & Reporting By recording all access events, UserLock offers comprehensive reports and de- tailed insights to support IT Forensics and legal investigations. If an IT security breach does occur, accurate information is available about who was connected, from which system(s), since what time, for how long, etc... Ease of Use & Enterprise Value Fast to deploy, UserLock is installed in minutes on a standard Windows Server. Easy setup Respond quickly to emergencies no matter where you are. Remote Session Administration A UserLock backup server can be installed to guarantee failover. Backup Helps expedite certain tasks and execute personalized requests on the information within UserLock. PowerShell Integration No need to navigate out of the console. Saves time when managing and responding to events. Launch Commands direct from the Console The GUI features intuitive tabbed navigation, at-a-glance analytics and several personalization options. Intuitive & Easy to use Microsoft-certified for compliance & support with Windows Server 2012 and Windows 8. Certification & Compliance Specified users can view and manage sessions without access to more critical settings. Delegate Administration Integrate the valuable data managed by UserLock, with other platforms to improve overall IT security management. Public & Fully documented API www.isdecisions.com | info@isdecisions.com Technopôle IZARBEL - Créaticité Bât. A BP12 - 64210 Bidart - FRANCE Phone: +335.59.41.42.20 - Fax: +335.59.41.42.21