ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Personal Information
Organization / Workplace
Biarritz, Aquitaine France
Industry
Technology / Software / Internet
Website
About
IS Decisions, founded in 2000 and based in Biarritz (France), is a software vendor specializing in Infrastructure and Security Management solutions for Microsoft Windows.
Contact Details

Presentations(11)Ìý

See all
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical Presentation
Ìý
IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.
Ìý
Mitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial SectorMitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial Sector
Ìý

Documents(8)Ìý

See all
Windows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic DepartmentWindows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic Department
Ìý
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of CyprusRisk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Ìý
Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock.
Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock.Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock.
Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock.
Ìý

Infographics(1)Ìý

Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
Ìý