userlock presentation | access security for windows networks
DESCRIPTION
UserLock is a unique enterprise software solution that sets and enforces a customized User Access Policy. Deliver a new level of security for your Windows & Active Directory networks.TRANSCRIPT
![Page 1: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/1.jpg)
UserLock® Access Security far beyond native Windows® features
![Page 2: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/2.jpg)
![Page 3: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/3.jpg)
IT’S OFTEN AUTHORIZED USERS (OR WHOM THEY SHARE THEIR LOGINS)
WHO EXPOSE CORPORATE DATA
![Page 4: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/4.jpg)
SECURITY FUNCTION NEEDED TO
BE ALERTED MONITOR REPORT RESTRICT
on all session activity throughout network
![Page 5: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/5.jpg)
USERLOCK®
OFFERS SECURITY FAR BEYOND NATIVE WINDOWS®
CONTROL
![Page 6: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/6.jpg)
USERLOCK® IN NUMB3RS
1M+ LICENSES IN USE
ACROSS
100+ COUNTRIES
3,000+ CUSTOMERS
![Page 7: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/7.jpg)
on PC
on LAPTOP
on TABLET
on SMARTPHONE
CREATE A CUSTOMIZED ACCESS POLICY AND RESPOND TO ANY SUSPICIOUS BEHAVIOR
![Page 8: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/8.jpg)
HOW DOES
IT WORK
![Page 9: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/9.jpg)
ACCESS MANAGEMENT
RESTRICT & CONTROL USER LOGINS that support your organization’s policies
![Page 10: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/10.jpg)
ACCORDING TO SESSION TYPE
ACCESS MANAGEMENT
IIS
TERMINAL VPN
WIFI WORKSTATION
![Page 11: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/11.jpg)
AND SET BY
ACCESS MANAGEMENT
ORGANIZATIONAL UNIT
USER USER GROUP
![Page 12: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/12.jpg)
LIMIT OR PREVENT CONCURRENT LOGINS
ACCESS MANAGEMENT
E.G.
Limit users to one session at a time
![Page 13: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/13.jpg)
RESTRICT WORKSTATION ACCESS
ACCESS MANAGEMENT
E.G.
Limit users to their own device
![Page 14: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/14.jpg)
SET TIME RESTRICTION
ACCESS MANAGEMENT
E.G.
Avoid connections outside of working hours
![Page 15: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/15.jpg)
SET TIME QUOTA
ACCESS MANAGEMENT
E.G.
Enforce daily connection time quotas
![Page 16: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/16.jpg)
ACCESS MANAGEMENT
WITH RESTRICTIONS SET YOU’RE IN CONTROL
![Page 17: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/17.jpg)
ACCESS MONITORING & INTELLIGENCE
USERLOCK® EMPOWERS IT to track, record and automatically
block all suspicious sessions
![Page 18: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/18.jpg)
MONITOR IN REAL-TIME
ACCESS MONITORING
Track who is connected, from which system, since what time, for how long, etc.
![Page 19: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/19.jpg)
RECEIVE ALERTS & INSTANTLY RESPOND
ACCESS MONITORING
This immediate response reduces the risk of malicious insider activity.
![Page 20: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/20.jpg)
REPORT DETAILED INSIGHTS
ACCESS MONITORING
To support IT forensics and legal investigations.
![Page 21: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/21.jpg)
RAISING USER
SECURITY AWARENESS
![Page 22: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/22.jpg)
SECURITY AWARENESS
YOU NEED TO EDUCATE DIRECTLY END-USERS ABOUT INSIDER THREATS
![Page 23: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/23.jpg)
SECURITY AWARENESS
PASSWORDS ARE LIKE UNDERWEAR
Change yours often.
Don’t share them with friends.
The longer, The better.
Be mysterious. Don’t leave yours lying around.
![Page 24: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/24.jpg)
SECURITY AWARENESS
COMMUNICATE POLICIES THROUGH A NOTIFICATION SYSTEM .
![Page 25: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/25.jpg)
SECURITY AWARENESS
![Page 26: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/26.jpg)
POWERFUL SECURITY
FOR YOUR
NETWORK
![Page 27: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/27.jpg)
USERLOCK BENEFITS
REDUCE THE ATTACK SURFACE OF YOUR WINDOWS® NETWORK LOGIN SESSION CONTROLS FAR BEYOND NATIVE WINDOWS FEATURES ALLOWS AN
ORGANIZATION TO IMPLEMENT AND ENFORCE AN EFFICIENT ACCESS SECURITY POLICY.
![Page 28: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/28.jpg)
USERLOCK BENEFITS
MANAGE THE THREAT OF SHARED PASSWORDS
PREVENTING CONCURRENT LOGINS REDUCE THE ABILITY OF USERS TO SHARE CREDENTIALS AS IT IMPACTS THEIR OWN ABILITY TO ACCESS THE NETWORK.
![Page 29: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/29.jpg)
USERLOCK BENEFITS
STOP ROGUE USERS SEAMLESSLY USING VALID CREDENTIALS
ADDRESS NETWORK VULNERABILITY BY MAKING IT IMPOSSIBLE FOR A ROGUE USER TO USE VALID CREDENTIALS AT THE SAME TIME AS THEIR LEGITIMATE OWNER (AND MAKE LEGITIMATE
USER ACCOUNTABLE FOR ANY ILLEGITIMATE ACTION THEY TAKE).
39 % of data breaches caused by MALICIOUS ATTACKS are the result of negligence, including PASSWORD THEFT.
Source: Symantec ® “Malicious Attacks Catching Up & Costing More” 2013
![Page 30: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/30.jpg)
USERLOCK BENEFITS
SECURE A BYOD ENVIRONMENT OFFER SECURITY TO A WIRELESS NETWORK AND THE ADOPTION OF BYOD
% 69 of SMBs don’t currently have a security solution for BYOD
Source: Voice of IT Survey on Mobile Security (Spiceworks, February 2013)
![Page 31: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/31.jpg)
USERLOCK BENEFITS
MITIGATE INSIDER THREATS REDUCE THE RISK OF MALICIOUS INSIDER ACTIVITY WITH
IMMEDIATE RESPONSE TO SUSPICIOUS OR DISRUPTIVE BEHAVIOR.
21 % of electronic crimes where COMMITTED BY INSIDERS
43 % of companies experienced at least one MALICIOUS, DELIBERATE INSIDER INCIDENT in the previous year
Source: CERT Insider Threat Center “CyberSecurity Watch Survey” 2012
![Page 32: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/32.jpg)
USERLOCK BENEFITS
GET COMPLIANT IMPLEMENT CERT BEST PRACTICES AND ENSURE COMPLIANCE WITH
MAJOR REGULATIONS SUCH AS SOX, FISMA, HIPAA
![Page 33: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/33.jpg)
USERLOCK BENEFITS
PERFORM ACCURATE IT FORENSICS IN THE EVENT OF AN IT SECURITY BREACH, DETAILED INSIGHTS ON EVERY
SESSION ACCESS EVENT SUPPORT IT FORENSICS AND LEGAL INVESTIGATIONS.
![Page 34: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/34.jpg)
WHAT’S MORE
EASE OF USE AND
ENTERPRISE VALUE
![Page 35: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/35.jpg)
WHAT’S MORE
LAUNCH COMMANDS FROM THE CONSOLE Saves time when managing and responding to events
![Page 36: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/36.jpg)
WHAT’S MORE
REMOTE SESSION ADMINISTRATION Respond quickly to emergencies no matter where you are.
![Page 37: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/37.jpg)
WHAT’S MORE
POWERSHELL INTEGRATION Helps expedite certain tasks and execute personalized requests on the information within UserLock.
![Page 38: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/38.jpg)
WHAT’S MORE
EASY TO INSTALL, EASY TO USE. Installed in minutes, an intuitive GUI features at-a-glance analytics and numerous personalization options.
![Page 39: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/39.jpg)
WHAT’S MORE
DELEGATE ADMINISTRATION This helps the delegation of certain tasks and helps to diminish IT workload!
![Page 40: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/40.jpg)
WHAT’S MORE
PUBLIC & FULLY DOCUMENTED API Utilize data with other platforms to improve overall IT security management.
![Page 41: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/41.jpg)
WHAT’S MORE
CERTIFICATION & COMPLIANCE Microsoft-certified for compliance & support with Windows Server 2012 and Windows 8.
![Page 42: UserLock Presentation | Access Security for Windows Networks](https://reader035.vdocument.in/reader035/viewer/2022081401/559438541a28ab2a7c8b45c9/html5/thumbnails/42.jpg)
WHAT’S MORE
BACKUP SERVER A UserLock backup server can be installed to guarantee failover.