IS Decisions address specific but important gaps in managing the security of Microsoft Windows & Active Directory Infrastructures. We are focused on providing solutions to prevent and mitigate insider threat breaches that take security controls beyond what’s available in native Windows functionality.
Our solutions also facilitate/automate many of the often tedious but necessary tasks associated with user access control, access monitoring, file access auditing, server & desktop reporting, patches & remote installations - saving time & money for organizations.
Some figures about IS Decisions. With insider threats emerging as one of the biggest risks to corporate data we’ve seen that more and more organizations are recognizing the need for security solutions to help prevent data breaches from inappropriate user access, intentional or not.
Trust and confidence in IS Decisions solutions has been underlined with several prestigious clients. Customers include some of the most security-sensitive organizations around the world. However our solutions attract any organization that wants to enhance the security of their Windows network.
The 4 key areas where we help organizations are:
1. Prevent Security Breaches
2. Mitigate Insider Threats
3. Get Compliant
4. Quickly Respond in Emergency situations
SMB customers find our solutions to be fast, efficient & affordable. Large Government & Enterprise customers impressed with the ease of use in a high-risk and complex environment.
Find out more at www.isdecisions.com
2. IS Decisions makes it easy to safeguard and secure
your Microsoft Windows and Active Directory infrastructure.
Microsoft Certified Partner Silver Application Development
14. SECURE NETWORK ACCESS
Restrictions by location – workstation, device
Limit or prevent concurrent logins
UserLock sets and enforces effective login
controls and restrictions (that cannot be
achieved in native Windows) on what
authenticated users can do. This fine-
grained access control helps ensure
inappropriate access to company data is
no longer a possibility.
Restrictions by usage/connection time
16. IMMEDIATE RESPONSE TO
SUSPICIOUS USER ACCESS
Recognize improper user access and respond
to risk behavior or access attempts from
someone other than the legitimate user
Real-Time Monitoring provides the
visibility into what users are doing and
the ability to take appropriate security
measures to alleviate security threats.
immediate and remote response to suspicious, disruptive or unusual logon connections
should be an integral part of any organizations security policy and risk mitigation strategy
17. ACCURATE IT FORENSICS IN THE
EVENT OF A SECURITY BREACH
Accurate, detailed information about who was connected,
from which system(s), since what time, for how long etc…
UserLock records and archives all access
events across the whole Windows Network,
giving IT the ability to support accountability,
legal investigations and internal trend analysis.
Time spent manually monitoring and auditing network access can be
significantly reduced (up to 90%), freeing up resources for other critical tasks
18. RAISE USER SECURITY
AWARENESS
Messages about legal and contractual implications discourage employees from committing cybercrime or lashing out for a
perceived injustice
UserLock notifies all users about any access denials on their account
Informed employees are an important line of
defense.
UserLocks’ notification system supports
organizations efforts to communicate security
policies, increase user security awareness and
educate about insider threats.
19. REDUCE THE ATTACK SURFACE
OF YOUR WINDOWS®
NETWORK
LOGIN SESSION CONTROLS FAR BEYOND NATIVE WINDOWS FEATURES ALLOWS AN
ORGANIZATION TO IMPLEMENT AND ENFORCE AN EFFICIENT ACCESS SECURITY POLICY.
20. MANAGE THE THREAT
OF SHARED PASSWORDS
PREVENTING CONCURRENT LOGINS REDUCE THE ABILITY OF USERS TO SHARE
CREDENTIALS AS IT IMPACTS THEIR OWN ABILITY TO ACCESS THE NETWORK.
21. STOP ROGUE USERS SEAMLESSLY
USING VALID CREDENTIALS
ADDRESS NETWORK VULNERABILITY BY MAKING IT IMPOSSIBLE FOR A ROGUE USER TO USE
VALID CREDENTIALS AT THE SAME TIME AS THEIR LEGITIMATE OWNER (AND MAKE LEGITIMATE
USER ACCOUNTABLE FOR ANY ILLEGITIMATE ACTION THEY TAKE).
39%
of data breaches caused by
MALICIOUS ATTACKS are
the result of negligence,
including PASSWORD THEFT.
Source: Symantec ® “Malicious Attacks Catching Up & Costing More” 2013
22. SECURE A BYOD ENVIRONMENT
OFFER SECURITY TO A WIRELESS NETWORK AND THE ADOPTION OF BYOD
%69of SMBs don’t currently
have a security
solution for BYOD
Source: Voice of IT Survey on Mobile Security (Spiceworks, February 2013)
23. MITIGATE INSIDER THREATS
REDUCE THE RISK OF MALICIOUS INSIDER ACTIVITY WITH
IMMEDIATE RESPONSE TO SUSPICIOUS OR DISRUPTIVE BEHAVIOR.
21%
of electronic crimes where
COMMITTED BY INSIDERS
43%
of companies experienced at least
one MALICIOUS, DELIBERATE INSIDER
INCIDENT in the previous year
Source: CERT Insider Threat Center “CyberSecurity Watch Survey” 2012
24. GET COMPLIANT
IMPLEMENT CERT BEST PRACTICES AND ENSURE COMPLIANCE WITH
MAJOR REGULATIONS SUCH AS SOX, FISMA, HIPAA
25. PERFORM ACCURATE IT FORENSICS
IN THE EVENT OF AN IT SECURITY BREACH, DETAILED INSIGHTS ON EVERY
SESSION ACCESS EVENT SUPPORT IT FORENSICS AND LEGAL INVESTIGATIONS.