August 5, 2019

Userlock

UserLock reduces the risk of external attacks, internal security breaches and compliance issues

UserLock secures user access to protect your network and the resources within

To protect against external attacks and internal security breaches, organizations need to extend the way they secure authenticated users access to company-sensitive files. UserLock’s access restrictions and real-time monitoring reduce the risk of security breaches and realize time and cost savings when it comes to tracking, auditing and reacting to suspicious access events.

UserLock enables IT to:

CONTROL & PROTECT :- Set restrictions using the contextual information around a user’s logon, to help verify all user’s claimed identity, and authorize, deny or limit network access.

DETECT& RESPOND :- Real-time monitoring and risk detection tools immediately alert on suspicious logon activity so you can take action quickly.

AUDIT & REPORT :- A centralized audit on all network logon events provides detailed reports to track down security threats, support forensics and prove regulatory compliance.

2 FACTOR AUTHENTICATION :- Enable customized, two-factor authentication on Windows logon and RDP connections.

How does UserLock work

UserLock continuously monitors all network logon events, across all session types (including Wi-Fi, VPN and IIS), automatically applying custom policies to permit or deny authenticated users’ access. UserLock allows you to track, report and immediately respond to any suspicious logon behavior, whether it originates on a PC, laptop, tablet or smartphone.

Easy to install, easy to use

You can install UserLock in minutes on a standard Windows Server. Microsoft-certified for compliance and support with Windows workstations and Windows Server, UserLock works with Active Directory to read information, but does not modify anything regarding accounts or schema.

UserLock – Key Benefits

> Mitigate the risk from both the malicious and careless insider threat
> Prevent security breaches from compromised employee login credentials
> Secure privileged users
> Control Wi-Fi Sessions for secure BYOD environments
> Alleviate the threat of users sharing passwords
> Comply with major regulations such as HIPAA, NIST 800-53, Sarbanes-Oxley, PCI, and NIPSOM Chapter 8
> Ensure access to critical assets is attributed to individual employees
> Realize resource and cost savings on tracking and auditing network access
> Optimize and manage shared workstation resources

DataSheet

You can download the UserLock datasheet here

Get FREE 30 day TRIAL of UserLock