an introduction to
IS Decisions makes it easy to safeguard and secure
your Microsoft Windows and Active Directory infrastructure.
Microsoft Certified Partner Silver Application Development
Founded in
2000 Operates in
129 countries
3,200+ clients
4 IT Security solutions
Snapshot
Helping Organizations
Prevent Security Breaches
Helping Organizations
Mitigate Insider Threats
Helping Organizations
Ensure regulatory compliance
Helping Organizations
Respond to IT emergencies
Innovative simplicity that the modern user expects Easy to use – Easy to install – Easy to protect your Windows Network
UserLock® Access Security far beyond native Windows® features
SECURITY FUNCTION NEEDED TO
BE ALERTED MONITOR REPORT RESTRICT
on all session activity throughout network
USERLOCK®
OFFERS SECURITY FAR BEYOND NATIVE WINDOWS®
CONTROL
on PC
on LAPTOP
on TABLET
on SMARTPHONE
CREATE A CUSTOMIZED ACCESS POLICY AND RESPOND TO ANY SUSPICIOUS BEHAVIOR
SECURE NETWORK ACCESS
Restrictions by location – workstation, device
Limit or prevent concurrent logins
UserLock sets and enforces effective login controls and restrictions (that cannot be achieved in native Windows) on what authenticated users can do. This fine-grained access control helps ensure inappropriate access to company data is no longer a possibility.
Restrictions by usage/connection time
WITH RESTRICTIONS SET YOU’RE IN CONTROL
IMMEDIATE RESPONSE TO SUSPICIOUS USER ACCESS
Recognize improper user access and respond to risk behavior or access attempts from someone other than the legitimate user
Real-Time Monitoring provides the visibility into what users are doing and the ability to take appropriate security measures to alleviate security threats.
immediate and remote response to suspicious, disruptive or unusual logon connections should be an integral part of any organizations security policy and risk mitigation strategy
ACCURATE IT FORENSICS IN THE EVENT OF A SECURITY BREACH
Accurate, detailed information about who was connected, from which system(s), since what time, for how long etc…
UserLock records and archives all access events across the whole Windows Network, giving IT the ability to support accountability, legal investigations and internal trend analysis.
Time spent manually monitoring and auditing network access can be significantly reduced (up to 90%), freeing up resources for other critical tasks
RAISE USER SECURITY AWARENESS
Messages about legal and contractual implications discourage employees from committing cybercrime or lashing out for a perceived injustice
UserLock notifies all users about any access denials on their account
Informed employees are an important line of defense. UserLocks’ notification system supports organizations efforts to communicate security policies, increase user security awareness and educate about insider threats.
REDUCE THE ATTACK SURFACE OF YOUR WINDOWS® NETWORK LOGIN SESSION CONTROLS FAR BEYOND NATIVE WINDOWS FEATURES ALLOWS AN
ORGANIZATION TO IMPLEMENT AND ENFORCE AN EFFICIENT ACCESS SECURITY POLICY.
MANAGE THE THREAT OF SHARED PASSWORDS
PREVENTING CONCURRENT LOGINS REDUCE THE ABILITY OF USERS TO SHARE CREDENTIALS AS IT IMPACTS THEIR OWN ABILITY TO ACCESS THE NETWORK.
STOP ROGUE USERS SEAMLESSLY USING VALID CREDENTIALS
ADDRESS NETWORK VULNERABILITY BY MAKING IT IMPOSSIBLE FOR A ROGUE USER TO USE VALID CREDENTIALS AT THE SAME TIME AS THEIR LEGITIMATE OWNER (AND MAKE LEGITIMATE
USER ACCOUNTABLE FOR ANY ILLEGITIMATE ACTION THEY TAKE).
39 % of data breaches caused by MALICIOUS ATTACKS are the result of negligence, including PASSWORD THEFT.
Source: Symantec ® “Malicious Attacks Catching Up & Costing More” 2013
SECURE A BYOD ENVIRONMENT OFFER SECURITY TO A WIRELESS NETWORK AND THE ADOPTION OF BYOD
% 69 of SMBs don’t currently have a security solution for BYOD
Source: Voice of IT Survey on Mobile Security (Spiceworks, February 2013)
MITIGATE INSIDER THREATS REDUCE THE RISK OF MALICIOUS INSIDER ACTIVITY WITH
IMMEDIATE RESPONSE TO SUSPICIOUS OR DISRUPTIVE BEHAVIOR.
21 % of electronic crimes where COMMITTED BY INSIDERS
43 % of companies experienced at least one MALICIOUS, DELIBERATE INSIDER INCIDENT in the previous year
Source: CERT Insider Threat Center “CyberSecurity Watch Survey” 2012
GET COMPLIANT IMPLEMENT CERT BEST PRACTICES AND ENSURE COMPLIANCE WITH
MAJOR REGULATIONS SUCH AS SOX, FISMA, HIPAA
PERFORM ACCURATE IT FORENSICS IN THE EVENT OF AN IT SECURITY BREACH, DETAILED INSIGHTS ON EVERY
SESSION ACCESS EVENT SUPPORT IT FORENSICS AND LEGAL INVESTIGATIONS.
FileAudit® Windows® File System Auditing. The Easy Way.
INTUITIVE EASY TO USE &
Easy to see what’s happening with company data
real-time ACTIVITY MONITORING
> read / write / delete access
> file ownership changes
> permission modifications
alerts TO FILE AND
ACTIVITY
Immediately address any inappropriate accesses
FOLDER
server CUSTOMIZED
INTELLIGENCE
file
See at a glance what’s happening across multiple Windows servers.
Searchable and secure audit trail to perform accurate IT forensics
CENTRALIZATION ARCHIVING &
management USER-SPECIFIC RIGHTS
External auditors can easily run reports Non-IT executives can easily monitor their own sensitive data
IS Decisions Headquarters
Créativité Bâtiment A Technopôle Izarbel 64210 Bidart (FRANCE) Phone: +335 59 41 42 20 Email: [email protected] Web: www.isdecisions.com
IS Decisions China Office
上海市襄阳南路 500 号 1502 室 邮编:200031 Phone: +86 21 54665710 Email: [email protected] Web: www.isdecisions.com.cn