User Access Security for Windows Active Directory
Secure user access to protect your network and the resources within
To protect against external attacks and internal security breaches, organizations need to extend the way they secure authenticated users access to company-sensitive files. UserLock’s access restrictions and real-time monitoring reduce the risk of security breaches and realize time and cost savings when it comes to tracking, auditing and reacting to suspicious access events.
How does it work
UserLock continuously monitors all network logon events, across all session types (including Wi-Fi, VPN and IIS), automatically applying custom policies to permit or deny authenticated users’ access. UserLock allows you to track, report and immediately respond to any suspicious logon behavior, whether it originates on a PC, laptop, tablet or smartphone.
Easy to install, easy to use
You can install UserLock in minutes on a standard Windows Server. Microsoft-certified for compliance and support with Windows 8 and Windows Server 2012, UserLock works with Active Directory to read information, but does not modify anything regarding accounts or schema.
UserLock enables IT to:
Control & restrict access to the network based on multiple criteria, including workstations or devices (including personal devices), time, business hours, and connection type
Prevent or limit concurrent or multiple logins
Monitor, alert and report on network access in real-time with detailed, graphical dashboards
Report and audit all access events in a centralized & achieved database.
Mitigate the risk from both the malicious and careless insider threat
Prevent security breaches from compromised employee login credentials
Secure privileged users
Control Wi-Fi Sessions for secure BYOD environments
Alleviate the threat of users sharing passwords
Comply with major regulations such as HIPAA, NIST 800-53, Sarbanes-Oxley, PCI, and NIPSOM Chapter 8
Ensure access to critical assets is attributed to individual employees
Realize resource and cost savings on tracking and auditing network access
Optimize and manage shared workstation resources