ºÝºÝߣ
Submit Search
IS Decisions
20
ºÝºÝߣShares
35
Followers
27
Followings
Block User
20
ºÝºÝߣShares
35
Followers
27
Followings
Personal Information
Organization / Workplace
Biarritz, Aquitaine France
Industry
Technology / Software / Internet
Website
About
IS Decisions, founded in 2000 and based in Biarritz (France), is a software vendor specializing in Infrastructure and Security Management solutions for Microsoft Windows.
Contact Details
Presentations
(11)Ìý
See all
UserLock 9 Technical Presentation
UserLock 9 Technical Presentation
Ìý
IS Decisions Company Overview. Solutions to secure your Windows Network.
IS Decisions Company Overview. Solutions to secure your Windows Network.
Ìý
Mitigating Insider Threats within the Banking & Financial Sector
Mitigating Insider Threats within the Banking & Financial Sector
Ìý
Windows Active Directory Security with IS Decisions
Windows Active Directory Security with IS Decisions
Ìý
FileAudit Presentation | Windows File System Auditing
FileAudit Presentation | Windows File System Auditing
Ìý
UserLock Presentation | Access Security for Windows Networks
UserLock Presentation | Access Security for Windows Networks
Ìý
Documents
(8)Ìý
See all
Windows Network Access Control for Government Traffic Department
Windows Network Access Control for Government Traffic Department
Ìý
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus
Ìý
Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock.
Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock.
Ìý
RemoteExec DataSheet
RemoteExec DataSheet
Ìý
School Network Security. Camden City School District Case Study
School Network Security. Camden City School District Case Study
Ìý
Information Security in the Banking Sector. A Case Study on UserLock
Information Security in the Banking Sector. A Case Study on UserLock
Ìý
Infographics
(1)Ìý
Security Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
Ìý