is decisions company overview. solutions to secure your windows network

35
an introduction to

Upload: is-decisions

Post on 25-Dec-2014

125 views

Category:

Software


0 download

DESCRIPTION

IS Decisions address specific but important gaps in managing the security of Microsoft Windows & Active Directory Infrastructures. We are focused on providing solutions to prevent and mitigate insider threat breaches that take security controls beyond what’s available in native Windows functionality. Our solutions also facilitate/automate many of the often tedious but necessary tasks associated with user access control, access monitoring, file access auditing, server & desktop reporting, patches & remote installations - saving time & money for organizations. Some figures about IS Decisions. With insider threats emerging as one of the biggest risks to corporate data we’ve seen that more and more organizations are recognizing the need for security solutions to help prevent data breaches from inappropriate user access, intentional or not. Trust and confidence in IS Decisions solutions has been underlined with several prestigious clients. Customers include some of the most security-sensitive organizations around the world. However our solutions attract any organization that wants to enhance the security of their Windows network. The 4 key areas where we help organizations are: 1. Prevent Security Breaches 2. Mitigate Insider Threats 3. Get Compliant 4. Quickly Respond in Emergency situations SMB customers find our solutions to be fast, efficient & affordable. Large Government & Enterprise customers impressed with the ease of use in a high-risk and complex environment. Find out more at www.isdecisions.com

TRANSCRIPT

Page 1: IS Decisions Company Overview. Solutions to secure your Windows Network

an introduction to

Page 2: IS Decisions Company Overview. Solutions to secure your Windows Network

IS Decisions makes it easy to safeguard and secure

your Microsoft Windows and Active Directory infrastructure.

Microsoft Certified Partner Silver Application Development

Page 3: IS Decisions Company Overview. Solutions to secure your Windows Network

Founded in

2000 Operates in

129 countries

3,200+ clients

4 IT Security solutions

Snapshot

Page 4: IS Decisions Company Overview. Solutions to secure your Windows Network
Page 5: IS Decisions Company Overview. Solutions to secure your Windows Network

Helping Organizations

Prevent Security Breaches

Page 6: IS Decisions Company Overview. Solutions to secure your Windows Network

Helping Organizations

Mitigate Insider Threats

Page 7: IS Decisions Company Overview. Solutions to secure your Windows Network

Helping Organizations

Ensure regulatory compliance

Page 8: IS Decisions Company Overview. Solutions to secure your Windows Network

Helping Organizations

Respond to IT emergencies

Page 9: IS Decisions Company Overview. Solutions to secure your Windows Network

Innovative simplicity that the modern user expects Easy to use – Easy to install – Easy to protect your Windows Network

Page 10: IS Decisions Company Overview. Solutions to secure your Windows Network

UserLock® Access Security far beyond native Windows® features

Page 11: IS Decisions Company Overview. Solutions to secure your Windows Network

SECURITY FUNCTION NEEDED TO

BE ALERTED MONITOR REPORT RESTRICT

on all session activity throughout network

Page 12: IS Decisions Company Overview. Solutions to secure your Windows Network

USERLOCK®

OFFERS SECURITY FAR BEYOND NATIVE WINDOWS®

CONTROL

Page 13: IS Decisions Company Overview. Solutions to secure your Windows Network

on PC

on LAPTOP

on TABLET

on SMARTPHONE

CREATE A CUSTOMIZED ACCESS POLICY AND RESPOND TO ANY SUSPICIOUS BEHAVIOR

Page 14: IS Decisions Company Overview. Solutions to secure your Windows Network

SECURE NETWORK ACCESS

Restrictions by location – workstation, device

Limit or prevent concurrent logins

UserLock sets and enforces effective login controls and restrictions (that cannot be achieved in native Windows) on what authenticated users can do. This fine-grained access control helps ensure inappropriate access to company data is no longer a possibility.

Restrictions by usage/connection time

Page 15: IS Decisions Company Overview. Solutions to secure your Windows Network

WITH RESTRICTIONS SET YOU’RE IN CONTROL

Page 16: IS Decisions Company Overview. Solutions to secure your Windows Network

IMMEDIATE RESPONSE TO SUSPICIOUS USER ACCESS

Recognize improper user access and respond to risk behavior or access attempts from someone other than the legitimate user

Real-Time Monitoring provides the visibility into what users are doing and the ability to take appropriate security measures to alleviate security threats.

immediate and remote response to suspicious, disruptive or unusual logon connections should be an integral part of any organizations security policy and risk mitigation strategy

Page 17: IS Decisions Company Overview. Solutions to secure your Windows Network

ACCURATE IT FORENSICS IN THE EVENT OF A SECURITY BREACH

Accurate, detailed information about who was connected, from which system(s), since what time, for how long etc…

UserLock records and archives all access events across the whole Windows Network, giving IT the ability to support accountability, legal investigations and internal trend analysis.

Time spent manually monitoring and auditing network access can be significantly reduced (up to 90%), freeing up resources for other critical tasks

Page 18: IS Decisions Company Overview. Solutions to secure your Windows Network

RAISE USER SECURITY AWARENESS

Messages about legal and contractual implications discourage employees from committing cybercrime or lashing out for a perceived injustice

UserLock notifies all users about any access denials on their account

Informed employees are an important line of defense. UserLocks’ notification system supports organizations efforts to communicate security policies, increase user security awareness and educate about insider threats.

Page 19: IS Decisions Company Overview. Solutions to secure your Windows Network

REDUCE THE ATTACK SURFACE OF YOUR WINDOWS® NETWORK LOGIN SESSION CONTROLS FAR BEYOND NATIVE WINDOWS FEATURES ALLOWS AN

ORGANIZATION TO IMPLEMENT AND ENFORCE AN EFFICIENT ACCESS SECURITY POLICY.

Page 20: IS Decisions Company Overview. Solutions to secure your Windows Network

MANAGE THE THREAT OF SHARED PASSWORDS

PREVENTING CONCURRENT LOGINS REDUCE THE ABILITY OF USERS TO SHARE CREDENTIALS AS IT IMPACTS THEIR OWN ABILITY TO ACCESS THE NETWORK.

Page 21: IS Decisions Company Overview. Solutions to secure your Windows Network

STOP ROGUE USERS SEAMLESSLY USING VALID CREDENTIALS

ADDRESS NETWORK VULNERABILITY BY MAKING IT IMPOSSIBLE FOR A ROGUE USER TO USE VALID CREDENTIALS AT THE SAME TIME AS THEIR LEGITIMATE OWNER (AND MAKE LEGITIMATE

USER ACCOUNTABLE FOR ANY ILLEGITIMATE ACTION THEY TAKE).

39 % of data breaches caused by MALICIOUS ATTACKS are the result of negligence, including PASSWORD THEFT.

Source: Symantec ® “Malicious Attacks Catching Up & Costing More” 2013

Page 22: IS Decisions Company Overview. Solutions to secure your Windows Network

SECURE A BYOD ENVIRONMENT OFFER SECURITY TO A WIRELESS NETWORK AND THE ADOPTION OF BYOD

% 69 of SMBs don’t currently have a security solution for BYOD

Source: Voice of IT Survey on Mobile Security (Spiceworks, February 2013)

Page 23: IS Decisions Company Overview. Solutions to secure your Windows Network

MITIGATE INSIDER THREATS REDUCE THE RISK OF MALICIOUS INSIDER ACTIVITY WITH

IMMEDIATE RESPONSE TO SUSPICIOUS OR DISRUPTIVE BEHAVIOR.

21 % of electronic crimes where COMMITTED BY INSIDERS

43 % of companies experienced at least one MALICIOUS, DELIBERATE INSIDER INCIDENT in the previous year

Source: CERT Insider Threat Center “CyberSecurity Watch Survey” 2012

Page 24: IS Decisions Company Overview. Solutions to secure your Windows Network

GET COMPLIANT IMPLEMENT CERT BEST PRACTICES AND ENSURE COMPLIANCE WITH

MAJOR REGULATIONS SUCH AS SOX, FISMA, HIPAA

Page 25: IS Decisions Company Overview. Solutions to secure your Windows Network

PERFORM ACCURATE IT FORENSICS IN THE EVENT OF AN IT SECURITY BREACH, DETAILED INSIGHTS ON EVERY

SESSION ACCESS EVENT SUPPORT IT FORENSICS AND LEGAL INVESTIGATIONS.

Page 26: IS Decisions Company Overview. Solutions to secure your Windows Network

DOWNLOAD A FREE FULLY-FUNCTIONAL TRIAL

NOW

WWW.USERLOCK.COM

Page 27: IS Decisions Company Overview. Solutions to secure your Windows Network

FileAudit® Windows® File System Auditing. The Easy Way.

Page 28: IS Decisions Company Overview. Solutions to secure your Windows Network

INTUITIVE EASY TO USE &

Easy to see what’s happening with company data

Page 29: IS Decisions Company Overview. Solutions to secure your Windows Network

real-time ACTIVITY MONITORING

> read / write / delete access

> file ownership changes

> permission modifications

Page 30: IS Decisions Company Overview. Solutions to secure your Windows Network

alerts TO FILE AND

ACTIVITY

Immediately address any inappropriate accesses

FOLDER

Page 31: IS Decisions Company Overview. Solutions to secure your Windows Network

server CUSTOMIZED

INTELLIGENCE

file

See at a glance what’s happening across multiple Windows servers.

Page 32: IS Decisions Company Overview. Solutions to secure your Windows Network

Searchable and secure audit trail to perform accurate IT forensics

CENTRALIZATION ARCHIVING &

Page 33: IS Decisions Company Overview. Solutions to secure your Windows Network

management USER-SPECIFIC RIGHTS

External auditors can easily run reports Non-IT executives can easily monitor their own sensitive data

Page 34: IS Decisions Company Overview. Solutions to secure your Windows Network

DOWNLOAD A FREE FULLY-FUNCTIONAL TRIAL

NOW

WWW.FILEAUDIT.COM

Page 35: IS Decisions Company Overview. Solutions to secure your Windows Network

IS Decisions Headquarters

Créativité Bâtiment A Technopôle Izarbel 64210 Bidart (FRANCE) Phone: +335 59 41 42 20 Email: [email protected] Web: www.isdecisions.com

IS Decisions China Office

上海市襄阳南路 500 号 1502 室 邮编:200031 Phone: +86 21 54665710 Email: [email protected] Web: www.isdecisions.com.cn