userlock presentation | access security for windows networks

Post on 02-Jul-2015

2.129 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

UserLock is a unique enterprise software solution that sets and enforces a customized User Access Policy. Deliver a new level of security for your Windows & Active Directory networks.

TRANSCRIPT

UserLock® Access Security far beyond native Windows® features

IT’S OFTEN AUTHORIZED USERS (OR WHOM THEY SHARE THEIR LOGINS)

WHO EXPOSE CORPORATE DATA

SECURITY FUNCTION NEEDED TO

BE ALERTED MONITOR REPORT RESTRICT

on all session activity throughout network

USERLOCK®

OFFERS SECURITY FAR BEYOND NATIVE WINDOWS®

CONTROL

USERLOCK® IN NUMB3RS

1M+ LICENSES IN USE

ACROSS

100+ COUNTRIES

3,000+ CUSTOMERS

on PC

on LAPTOP

on TABLET

on SMARTPHONE

CREATE A CUSTOMIZED ACCESS POLICY AND RESPOND TO ANY SUSPICIOUS BEHAVIOR

HOW DOES

IT WORK

ACCESS MANAGEMENT

RESTRICT & CONTROL USER LOGINS that support your organization’s policies

ACCORDING TO SESSION TYPE

ACCESS MANAGEMENT

IIS

TERMINAL VPN

WIFI WORKSTATION

AND SET BY

ACCESS MANAGEMENT

ORGANIZATIONAL UNIT

USER USER GROUP

LIMIT OR PREVENT CONCURRENT LOGINS

ACCESS MANAGEMENT

E.G.

Limit users to one session at a time

RESTRICT WORKSTATION ACCESS

ACCESS MANAGEMENT

E.G.

Limit users to their own device

SET TIME RESTRICTION

ACCESS MANAGEMENT

E.G.

Avoid connections outside of working hours

SET TIME QUOTA

ACCESS MANAGEMENT

E.G.

Enforce daily connection time quotas

ACCESS MANAGEMENT

WITH RESTRICTIONS SET YOU’RE IN CONTROL

ACCESS MONITORING & INTELLIGENCE

USERLOCK® EMPOWERS IT to track, record and automatically

block all suspicious sessions

MONITOR IN REAL-TIME

ACCESS MONITORING

Track who is connected, from which system, since what time, for how long, etc.

RECEIVE ALERTS & INSTANTLY RESPOND

ACCESS MONITORING

This immediate response reduces the risk of malicious insider activity.

REPORT DETAILED INSIGHTS

ACCESS MONITORING

To support IT forensics and legal investigations.

RAISING USER

SECURITY AWARENESS

SECURITY AWARENESS

YOU NEED TO EDUCATE DIRECTLY END-USERS ABOUT INSIDER THREATS

SECURITY AWARENESS

PASSWORDS ARE LIKE UNDERWEAR

Change yours often.

Don’t share them with friends.

The longer, The better.

Be mysterious. Don’t leave yours lying around.

SECURITY AWARENESS

COMMUNICATE POLICIES THROUGH A NOTIFICATION SYSTEM .

SECURITY AWARENESS

POWERFUL SECURITY

FOR YOUR

NETWORK

USERLOCK BENEFITS

REDUCE THE ATTACK SURFACE OF YOUR WINDOWS® NETWORK LOGIN SESSION CONTROLS FAR BEYOND NATIVE WINDOWS FEATURES ALLOWS AN

ORGANIZATION TO IMPLEMENT AND ENFORCE AN EFFICIENT ACCESS SECURITY POLICY.

USERLOCK BENEFITS

MANAGE THE THREAT OF SHARED PASSWORDS

PREVENTING CONCURRENT LOGINS REDUCE THE ABILITY OF USERS TO SHARE CREDENTIALS AS IT IMPACTS THEIR OWN ABILITY TO ACCESS THE NETWORK.

USERLOCK BENEFITS

STOP ROGUE USERS SEAMLESSLY USING VALID CREDENTIALS

ADDRESS NETWORK VULNERABILITY BY MAKING IT IMPOSSIBLE FOR A ROGUE USER TO USE VALID CREDENTIALS AT THE SAME TIME AS THEIR LEGITIMATE OWNER (AND MAKE LEGITIMATE

USER ACCOUNTABLE FOR ANY ILLEGITIMATE ACTION THEY TAKE).

39 % of data breaches caused by MALICIOUS ATTACKS are the result of negligence, including PASSWORD THEFT.

Source: Symantec ® “Malicious Attacks Catching Up & Costing More” 2013

USERLOCK BENEFITS

SECURE A BYOD ENVIRONMENT OFFER SECURITY TO A WIRELESS NETWORK AND THE ADOPTION OF BYOD

% 69 of SMBs don’t currently have a security solution for BYOD

Source: Voice of IT Survey on Mobile Security (Spiceworks, February 2013)

USERLOCK BENEFITS

MITIGATE INSIDER THREATS REDUCE THE RISK OF MALICIOUS INSIDER ACTIVITY WITH

IMMEDIATE RESPONSE TO SUSPICIOUS OR DISRUPTIVE BEHAVIOR.

21 % of electronic crimes where COMMITTED BY INSIDERS

43 % of companies experienced at least one MALICIOUS, DELIBERATE INSIDER INCIDENT in the previous year

Source: CERT Insider Threat Center “CyberSecurity Watch Survey” 2012

USERLOCK BENEFITS

GET COMPLIANT IMPLEMENT CERT BEST PRACTICES AND ENSURE COMPLIANCE WITH

MAJOR REGULATIONS SUCH AS SOX, FISMA, HIPAA

USERLOCK BENEFITS

PERFORM ACCURATE IT FORENSICS IN THE EVENT OF AN IT SECURITY BREACH, DETAILED INSIGHTS ON EVERY

SESSION ACCESS EVENT SUPPORT IT FORENSICS AND LEGAL INVESTIGATIONS.

WHAT’S MORE

EASE OF USE AND

ENTERPRISE VALUE

WHAT’S MORE

LAUNCH COMMANDS FROM THE CONSOLE Saves time when managing and responding to events

WHAT’S MORE

REMOTE SESSION ADMINISTRATION Respond quickly to emergencies no matter where you are.

WHAT’S MORE

POWERSHELL INTEGRATION Helps expedite certain tasks and execute personalized requests on the information within UserLock.

WHAT’S MORE

EASY TO INSTALL, EASY TO USE. Installed in minutes, an intuitive GUI features at-a-glance analytics and numerous personalization options.

WHAT’S MORE

DELEGATE ADMINISTRATION This helps the delegation of certain tasks and helps to diminish IT workload!

WHAT’S MORE

PUBLIC & FULLY DOCUMENTED API Utilize data with other platforms to improve overall IT security management.

WHAT’S MORE

CERTIFICATION & COMPLIANCE Microsoft-certified for compliance & support with Windows Server 2012 and Windows 8.

WHAT’S MORE

BACKUP SERVER A UserLock backup server can be installed to guarantee failover.

DOWNLOAD A FREE FULLY-FUNCTIONAL TRIAL

NOW

WWW.USERLOCK.COM

top related