is decisions company overview. solutions to secure your windows network
DESCRIPTION
IS Decisions address specific but important gaps in managing the security of Microsoft Windows & Active Directory Infrastructures. We are focused on providing solutions to prevent and mitigate insider threat breaches that take security controls beyond what’s available in native Windows functionality. Our solutions also facilitate/automate many of the often tedious but necessary tasks associated with user access control, access monitoring, file access auditing, server & desktop reporting, patches & remote installations - saving time & money for organizations. Some figures about IS Decisions. With insider threats emerging as one of the biggest risks to corporate data we’ve seen that more and more organizations are recognizing the need for security solutions to help prevent data breaches from inappropriate user access, intentional or not. Trust and confidence in IS Decisions solutions has been underlined with several prestigious clients. Customers include some of the most security-sensitive organizations around the world. However our solutions attract any organization that wants to enhance the security of their Windows network. The 4 key areas where we help organizations are: 1. Prevent Security Breaches 2. Mitigate Insider Threats 3. Get Compliant 4. Quickly Respond in Emergency situations SMB customers find our solutions to be fast, efficient & affordable. Large Government & Enterprise customers impressed with the ease of use in a high-risk and complex environment. Find out more at www.isdecisions.comTRANSCRIPT
![Page 1: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/1.jpg)
an introduction to
![Page 2: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/2.jpg)
IS Decisions makes it easy to safeguard and secure
your Microsoft Windows and Active Directory infrastructure.
Microsoft Certified Partner Silver Application Development
![Page 3: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/3.jpg)
Founded in
2000 Operates in
129 countries
3,200+ clients
4 IT Security solutions
Snapshot
![Page 4: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/4.jpg)
![Page 5: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/5.jpg)
Helping Organizations
Prevent Security Breaches
![Page 6: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/6.jpg)
Helping Organizations
Mitigate Insider Threats
![Page 7: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/7.jpg)
Helping Organizations
Ensure regulatory compliance
![Page 8: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/8.jpg)
Helping Organizations
Respond to IT emergencies
![Page 9: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/9.jpg)
Innovative simplicity that the modern user expects Easy to use – Easy to install – Easy to protect your Windows Network
![Page 10: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/10.jpg)
UserLock® Access Security far beyond native Windows® features
![Page 11: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/11.jpg)
SECURITY FUNCTION NEEDED TO
BE ALERTED MONITOR REPORT RESTRICT
on all session activity throughout network
![Page 12: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/12.jpg)
USERLOCK®
OFFERS SECURITY FAR BEYOND NATIVE WINDOWS®
CONTROL
![Page 13: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/13.jpg)
on PC
on LAPTOP
on TABLET
on SMARTPHONE
CREATE A CUSTOMIZED ACCESS POLICY AND RESPOND TO ANY SUSPICIOUS BEHAVIOR
![Page 14: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/14.jpg)
SECURE NETWORK ACCESS
Restrictions by location – workstation, device
Limit or prevent concurrent logins
UserLock sets and enforces effective login controls and restrictions (that cannot be achieved in native Windows) on what authenticated users can do. This fine-grained access control helps ensure inappropriate access to company data is no longer a possibility.
Restrictions by usage/connection time
![Page 15: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/15.jpg)
WITH RESTRICTIONS SET YOU’RE IN CONTROL
![Page 16: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/16.jpg)
IMMEDIATE RESPONSE TO SUSPICIOUS USER ACCESS
Recognize improper user access and respond to risk behavior or access attempts from someone other than the legitimate user
Real-Time Monitoring provides the visibility into what users are doing and the ability to take appropriate security measures to alleviate security threats.
immediate and remote response to suspicious, disruptive or unusual logon connections should be an integral part of any organizations security policy and risk mitigation strategy
![Page 17: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/17.jpg)
ACCURATE IT FORENSICS IN THE EVENT OF A SECURITY BREACH
Accurate, detailed information about who was connected, from which system(s), since what time, for how long etc…
UserLock records and archives all access events across the whole Windows Network, giving IT the ability to support accountability, legal investigations and internal trend analysis.
Time spent manually monitoring and auditing network access can be significantly reduced (up to 90%), freeing up resources for other critical tasks
![Page 18: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/18.jpg)
RAISE USER SECURITY AWARENESS
Messages about legal and contractual implications discourage employees from committing cybercrime or lashing out for a perceived injustice
UserLock notifies all users about any access denials on their account
Informed employees are an important line of defense. UserLocks’ notification system supports organizations efforts to communicate security policies, increase user security awareness and educate about insider threats.
![Page 19: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/19.jpg)
REDUCE THE ATTACK SURFACE OF YOUR WINDOWS® NETWORK LOGIN SESSION CONTROLS FAR BEYOND NATIVE WINDOWS FEATURES ALLOWS AN
ORGANIZATION TO IMPLEMENT AND ENFORCE AN EFFICIENT ACCESS SECURITY POLICY.
![Page 20: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/20.jpg)
MANAGE THE THREAT OF SHARED PASSWORDS
PREVENTING CONCURRENT LOGINS REDUCE THE ABILITY OF USERS TO SHARE CREDENTIALS AS IT IMPACTS THEIR OWN ABILITY TO ACCESS THE NETWORK.
![Page 21: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/21.jpg)
STOP ROGUE USERS SEAMLESSLY USING VALID CREDENTIALS
ADDRESS NETWORK VULNERABILITY BY MAKING IT IMPOSSIBLE FOR A ROGUE USER TO USE VALID CREDENTIALS AT THE SAME TIME AS THEIR LEGITIMATE OWNER (AND MAKE LEGITIMATE
USER ACCOUNTABLE FOR ANY ILLEGITIMATE ACTION THEY TAKE).
39 % of data breaches caused by MALICIOUS ATTACKS are the result of negligence, including PASSWORD THEFT.
Source: Symantec ® “Malicious Attacks Catching Up & Costing More” 2013
![Page 22: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/22.jpg)
SECURE A BYOD ENVIRONMENT OFFER SECURITY TO A WIRELESS NETWORK AND THE ADOPTION OF BYOD
% 69 of SMBs don’t currently have a security solution for BYOD
Source: Voice of IT Survey on Mobile Security (Spiceworks, February 2013)
![Page 23: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/23.jpg)
MITIGATE INSIDER THREATS REDUCE THE RISK OF MALICIOUS INSIDER ACTIVITY WITH
IMMEDIATE RESPONSE TO SUSPICIOUS OR DISRUPTIVE BEHAVIOR.
21 % of electronic crimes where COMMITTED BY INSIDERS
43 % of companies experienced at least one MALICIOUS, DELIBERATE INSIDER INCIDENT in the previous year
Source: CERT Insider Threat Center “CyberSecurity Watch Survey” 2012
![Page 24: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/24.jpg)
GET COMPLIANT IMPLEMENT CERT BEST PRACTICES AND ENSURE COMPLIANCE WITH
MAJOR REGULATIONS SUCH AS SOX, FISMA, HIPAA
![Page 25: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/25.jpg)
PERFORM ACCURATE IT FORENSICS IN THE EVENT OF AN IT SECURITY BREACH, DETAILED INSIGHTS ON EVERY
SESSION ACCESS EVENT SUPPORT IT FORENSICS AND LEGAL INVESTIGATIONS.
![Page 27: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/27.jpg)
FileAudit® Windows® File System Auditing. The Easy Way.
![Page 28: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/28.jpg)
INTUITIVE EASY TO USE &
Easy to see what’s happening with company data
![Page 29: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/29.jpg)
real-time ACTIVITY MONITORING
> read / write / delete access
> file ownership changes
> permission modifications
![Page 30: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/30.jpg)
alerts TO FILE AND
ACTIVITY
Immediately address any inappropriate accesses
FOLDER
![Page 31: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/31.jpg)
server CUSTOMIZED
INTELLIGENCE
file
See at a glance what’s happening across multiple Windows servers.
![Page 32: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/32.jpg)
Searchable and secure audit trail to perform accurate IT forensics
CENTRALIZATION ARCHIVING &
![Page 33: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/33.jpg)
management USER-SPECIFIC RIGHTS
External auditors can easily run reports Non-IT executives can easily monitor their own sensitive data
![Page 35: IS Decisions Company Overview. Solutions to secure your Windows Network](https://reader034.vdocument.in/reader034/viewer/2022051818/549c8067ac7959b52a8b4733/html5/thumbnails/35.jpg)
IS Decisions Headquarters
Créativité Bâtiment A Technopôle Izarbel 64210 Bidart (FRANCE) Phone: +335 59 41 42 20 Email: [email protected] Web: www.isdecisions.com
IS Decisions China Office
上海市襄阳南路 500 号 1502 室 邮编:200031 Phone: +86 21 54665710 Email: [email protected] Web: www.isdecisions.com.cn