ºÝºÝߣshows by User: IS_Decisions / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: IS_Decisions / Mon, 05 Dec 2016 15:55:02 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: IS_Decisions Security Breaches from Compromised User Logins /slideshow/security-breaches-from-compromised-user-logins/69839365 stop-blaming-your-users-for-compromised-credentials-161205155502
Stop blaming your users for compromised passwords. Bolster your defense against security breaches that stem from both stolen and shared user login credentials. For IT security administrators it's tough to identify malicious network access from valid credentials. Rather than blaming users for being human, our latest infographic shows you how to better protect users' authenticated logins. By taking a closer look at the contextual information around the logon or file access, you can identify and stop network access when credentials have been compromised. ]]>

Stop blaming your users for compromised passwords. Bolster your defense against security breaches that stem from both stolen and shared user login credentials. For IT security administrators it's tough to identify malicious network access from valid credentials. Rather than blaming users for being human, our latest infographic shows you how to better protect users' authenticated logins. By taking a closer look at the contextual information around the logon or file access, you can identify and stop network access when credentials have been compromised. ]]>
Mon, 05 Dec 2016 15:55:02 GMT /slideshow/security-breaches-from-compromised-user-logins/69839365 IS_Decisions@slideshare.net(IS_Decisions) Security Breaches from Compromised User Logins IS_Decisions Stop blaming your users for compromised passwords. Bolster your defense against security breaches that stem from both stolen and shared user login credentials. For IT security administrators it's tough to identify malicious network access from valid credentials. Rather than blaming users for being human, our latest infographic shows you how to better protect users' authenticated logins. By taking a closer look at the contextual information around the logon or file access, you can identify and stop network access when credentials have been compromised. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stop-blaming-your-users-for-compromised-credentials-161205155502-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Stop blaming your users for compromised passwords. Bolster your defense against security breaches that stem from both stolen and shared user login credentials. For IT security administrators it&#39;s tough to identify malicious network access from valid credentials. Rather than blaming users for being human, our latest infographic shows you how to better protect users&#39; authenticated logins. By taking a closer look at the contextual information around the logon or file access, you can identify and stop network access when credentials have been compromised.
Security Breaches from Compromised User Logins from IS Decisions
]]>
256 5 https://cdn.slidesharecdn.com/ss_thumbnails/stop-blaming-your-users-for-compromised-credentials-161205155502-thumbnail.jpg?width=120&height=120&fit=bounds infographic Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
UserLock 9 Technical Presentation /slideshow/userlock-9-technical-presentation/63365175 userlock-9-technical-presentation-160623072954
UserLock works alongside Active Directory to better protect access to Windows systems. With specific and customizable user login rules and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. UserLock is a client server application capable of auditing and controlling different types of user access connections. How UserLock works: The user enters their credentials to log on or to establish a connection to the domain network. These credentials are verified and validated against Active Directory. If the authentication process fails, the connection will be refused by Windows and UserLock does not intervene. The agent will however notify the UserLock server about this logon failure. If the authentication is successful, the UserLock agent will transmit to the UserLock server all information about the context of the connection requested. The UserLock server will then process and analyze the data transmitted by the agent to check access control rules, trigger any alerts, refresh session information and save the user connection event in the database. The server then communicates its decision to the agent regarding the acceptance or refusal of the connection requested. Audited data. UserLock records and reports on every session access event: On a connection event of a domain user to the network, the UserLock agent transmits to the server a set of data. This set includes information on connection event type, connection type requested, the user and the source. This information is retrieved by the agent itself when the connection event is submitted by the user, and sent encrypted to the UserLock server, which determines the time of the connection request and saves all in its database. Thus all user connection information performed on agent hosts are collected and stored centrally. The exploitation of real-time audited data. All data audited at the moment of attempted connection is analyzed to verify if the user requesting the connection is subject to access control rules. Transparent to the user, these context aware access controls help verify authenticated users' claimed identity to protect against unauthorized access and compromised credentials. Real Time alert notifications. The user rules also include alert notifications for defined connection events. Two types of alerts can be defined, pop-up and email messages. ]]>

UserLock works alongside Active Directory to better protect access to Windows systems. With specific and customizable user login rules and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. UserLock is a client server application capable of auditing and controlling different types of user access connections. How UserLock works: The user enters their credentials to log on or to establish a connection to the domain network. These credentials are verified and validated against Active Directory. If the authentication process fails, the connection will be refused by Windows and UserLock does not intervene. The agent will however notify the UserLock server about this logon failure. If the authentication is successful, the UserLock agent will transmit to the UserLock server all information about the context of the connection requested. The UserLock server will then process and analyze the data transmitted by the agent to check access control rules, trigger any alerts, refresh session information and save the user connection event in the database. The server then communicates its decision to the agent regarding the acceptance or refusal of the connection requested. Audited data. UserLock records and reports on every session access event: On a connection event of a domain user to the network, the UserLock agent transmits to the server a set of data. This set includes information on connection event type, connection type requested, the user and the source. This information is retrieved by the agent itself when the connection event is submitted by the user, and sent encrypted to the UserLock server, which determines the time of the connection request and saves all in its database. Thus all user connection information performed on agent hosts are collected and stored centrally. The exploitation of real-time audited data. All data audited at the moment of attempted connection is analyzed to verify if the user requesting the connection is subject to access control rules. Transparent to the user, these context aware access controls help verify authenticated users' claimed identity to protect against unauthorized access and compromised credentials. Real Time alert notifications. The user rules also include alert notifications for defined connection events. Two types of alerts can be defined, pop-up and email messages. ]]>
Thu, 23 Jun 2016 07:29:54 GMT /slideshow/userlock-9-technical-presentation/63365175 IS_Decisions@slideshare.net(IS_Decisions) UserLock 9 Technical Presentation IS_Decisions UserLock works alongside Active Directory to better protect access to Windows systems. With specific and customizable user login rules and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. UserLock is a client server application capable of auditing and controlling different types of user access connections. How UserLock works: The user enters their credentials to log on or to establish a connection to the domain network. These credentials are verified and validated against Active Directory. If the authentication process fails, the connection will be refused by Windows and UserLock does not intervene. The agent will however notify the UserLock server about this logon failure. If the authentication is successful, the UserLock agent will transmit to the UserLock server all information about the context of the connection requested. The UserLock server will then process and analyze the data transmitted by the agent to check access control rules, trigger any alerts, refresh session information and save the user connection event in the database. The server then communicates its decision to the agent regarding the acceptance or refusal of the connection requested. Audited data. UserLock records and reports on every session access event: On a connection event of a domain user to the network, the UserLock agent transmits to the server a set of data. This set includes information on connection event type, connection type requested, the user and the source. This information is retrieved by the agent itself when the connection event is submitted by the user, and sent encrypted to the UserLock server, which determines the time of the connection request and saves all in its database. Thus all user connection information performed on agent hosts are collected and stored centrally. The exploitation of real-time audited data. All data audited at the moment of attempted connection is analyzed to verify if the user requesting the connection is subject to access control rules. Transparent to the user, these context aware access controls help verify authenticated users' claimed identity to protect against unauthorized access and compromised credentials. Real Time alert notifications. The user rules also include alert notifications for defined connection events. Two types of alerts can be defined, pop-up and email messages. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/userlock-9-technical-presentation-160623072954-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> UserLock works alongside Active Directory to better protect access to Windows systems. With specific and customizable user login rules and real-time monitoring, UserLock reduces the risk of external attacks and internal security breaches while helping to address regulatory compliance. UserLock is a client server application capable of auditing and controlling different types of user access connections. How UserLock works: The user enters their credentials to log on or to establish a connection to the domain network. These credentials are verified and validated against Active Directory. If the authentication process fails, the connection will be refused by Windows and UserLock does not intervene. The agent will however notify the UserLock server about this logon failure. If the authentication is successful, the UserLock agent will transmit to the UserLock server all information about the context of the connection requested. The UserLock server will then process and analyze the data transmitted by the agent to check access control rules, trigger any alerts, refresh session information and save the user connection event in the database. The server then communicates its decision to the agent regarding the acceptance or refusal of the connection requested. Audited data. UserLock records and reports on every session access event: On a connection event of a domain user to the network, the UserLock agent transmits to the server a set of data. This set includes information on connection event type, connection type requested, the user and the source. This information is retrieved by the agent itself when the connection event is submitted by the user, and sent encrypted to the UserLock server, which determines the time of the connection request and saves all in its database. Thus all user connection information performed on agent hosts are collected and stored centrally. The exploitation of real-time audited data. All data audited at the moment of attempted connection is analyzed to verify if the user requesting the connection is subject to access control rules. Transparent to the user, these context aware access controls help verify authenticated users&#39; claimed identity to protect against unauthorized access and compromised credentials. Real Time alert notifications. The user rules also include alert notifications for defined connection events. Two types of alerts can be defined, pop-up and email messages.
UserLock 9 Technical Presentation from IS Decisions
]]>
565 4 https://cdn.slidesharecdn.com/ss_thumbnails/userlock-9-technical-presentation-160623072954-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
IS Decisions Company Overview. Solutions to secure your Windows Network. /slideshow/is-decisions-company-overview/34678975 isdecisionspresentation-140514104611-phpapp01
IS Decisions address specific but important gaps in managing the security of Microsoft Windows & Active Directory Infrastructures. We are focused on providing solutions to prevent and mitigate insider threat breaches that take security controls beyond what’s available in native Windows functionality. Our solutions also facilitate/automate many of the often tedious but necessary tasks associated with user access control, access monitoring, file access auditing, server & desktop reporting, patches & remote installations - saving time & money for organizations. Some figures about IS Decisions. With insider threats emerging as one of the biggest risks to corporate data we’ve seen that more and more organizations are recognizing the need for security solutions to help prevent data breaches from inappropriate user access, intentional or not. Trust and confidence in IS Decisions solutions has been underlined with several prestigious clients. Customers include some of the most security-sensitive organizations around the world. However our solutions attract any organization that wants to enhance the security of their Windows network. The 4 key areas where we help organizations are: 1. Prevent Security Breaches 2. Mitigate Insider Threats 3. Get Compliant 4. Quickly Respond in Emergency situations SMB customers find our solutions to be fast, efficient & affordable. Large Government & Enterprise customers impressed with the ease of use in a high-risk and complex environment. Find out more at www.isdecisions.com]]>

IS Decisions address specific but important gaps in managing the security of Microsoft Windows & Active Directory Infrastructures. We are focused on providing solutions to prevent and mitigate insider threat breaches that take security controls beyond what’s available in native Windows functionality. Our solutions also facilitate/automate many of the often tedious but necessary tasks associated with user access control, access monitoring, file access auditing, server & desktop reporting, patches & remote installations - saving time & money for organizations. Some figures about IS Decisions. With insider threats emerging as one of the biggest risks to corporate data we’ve seen that more and more organizations are recognizing the need for security solutions to help prevent data breaches from inappropriate user access, intentional or not. Trust and confidence in IS Decisions solutions has been underlined with several prestigious clients. Customers include some of the most security-sensitive organizations around the world. However our solutions attract any organization that wants to enhance the security of their Windows network. The 4 key areas where we help organizations are: 1. Prevent Security Breaches 2. Mitigate Insider Threats 3. Get Compliant 4. Quickly Respond in Emergency situations SMB customers find our solutions to be fast, efficient & affordable. Large Government & Enterprise customers impressed with the ease of use in a high-risk and complex environment. Find out more at www.isdecisions.com]]>
Wed, 14 May 2014 10:46:11 GMT /slideshow/is-decisions-company-overview/34678975 IS_Decisions@slideshare.net(IS_Decisions) IS Decisions Company Overview. Solutions to secure your Windows Network. IS_Decisions IS Decisions address specific but important gaps in managing the security of Microsoft Windows & Active Directory Infrastructures. We are focused on providing solutions to prevent and mitigate insider threat breaches that take security controls beyond what’s available in native Windows functionality. Our solutions also facilitate/automate many of the often tedious but necessary tasks associated with user access control, access monitoring, file access auditing, server & desktop reporting, patches & remote installations - saving time & money for organizations. Some figures about IS Decisions. With insider threats emerging as one of the biggest risks to corporate data we’ve seen that more and more organizations are recognizing the need for security solutions to help prevent data breaches from inappropriate user access, intentional or not. Trust and confidence in IS Decisions solutions has been underlined with several prestigious clients. Customers include some of the most security-sensitive organizations around the world. However our solutions attract any organization that wants to enhance the security of their Windows network. The 4 key areas where we help organizations are: 1. Prevent Security Breaches 2. Mitigate Insider Threats 3. Get Compliant 4. Quickly Respond in Emergency situations SMB customers find our solutions to be fast, efficient & affordable. Large Government & Enterprise customers impressed with the ease of use in a high-risk and complex environment. Find out more at www.isdecisions.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/isdecisionspresentation-140514104611-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> IS Decisions address specific but important gaps in managing the security of Microsoft Windows &amp; Active Directory Infrastructures. We are focused on providing solutions to prevent and mitigate insider threat breaches that take security controls beyond what’s available in native Windows functionality. Our solutions also facilitate/automate many of the often tedious but necessary tasks associated with user access control, access monitoring, file access auditing, server &amp; desktop reporting, patches &amp; remote installations - saving time &amp; money for organizations. Some figures about IS Decisions. With insider threats emerging as one of the biggest risks to corporate data we’ve seen that more and more organizations are recognizing the need for security solutions to help prevent data breaches from inappropriate user access, intentional or not. Trust and confidence in IS Decisions solutions has been underlined with several prestigious clients. Customers include some of the most security-sensitive organizations around the world. However our solutions attract any organization that wants to enhance the security of their Windows network. The 4 key areas where we help organizations are: 1. Prevent Security Breaches 2. Mitigate Insider Threats 3. Get Compliant 4. Quickly Respond in Emergency situations SMB customers find our solutions to be fast, efficient &amp; affordable. Large Government &amp; Enterprise customers impressed with the ease of use in a high-risk and complex environment. Find out more at www.isdecisions.com
IS Decisions Company Overview. Solutions to secure your Windows Network. from IS Decisions
]]>
676 2 https://cdn.slidesharecdn.com/ss_thumbnails/isdecisionspresentation-140514104611-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Mitigating Insider Threats within the Banking & Financial Sector /slideshow/user-lock-insider-threatsfinancial-sector-32801913/32801913 userlockinsiderthreatsfinancialsector-140327052510-phpapp01
When we talk about cybercrime in the Banking & Financial Sector we tend to focus on external threats, but often organisation insiders are more likely to be the source of the breach. In fact you could say insider threats pose a greater risk than external threats as your employees already know where the company’s ‘crown jewels’ are. These crown jewels could include the assets that drive cash flows, competitive advantage and shareholder value. Insiders tend to know what exactly resides on the networks and how to gain access to them for the purpose of theft, disclosure, destruction or indeed manipulation. For example the leaking and disclosure of critical information could lead to the manipulation of share values. This is a far more effective means of profiting through cybercrime than traditional fraud techniques. So how do you tackle this problem of insider threats? The solution is that it must be tackled from two angles, both culturally, in the education of your users, and technologically, by putting further controls, restrictions and monitoring in place on your users – for their own benefit and that of the organization they work for. UserLock is an enterprise security software that controls and secures network access for all authenticated users. UserLock helps organizations - including those within the financial sector - reduce the risks of security breaches from insider threats (intentional or not), offer an immediate response to suspicious user behavior and get compliant with major regulations. ]]>

When we talk about cybercrime in the Banking & Financial Sector we tend to focus on external threats, but often organisation insiders are more likely to be the source of the breach. In fact you could say insider threats pose a greater risk than external threats as your employees already know where the company’s ‘crown jewels’ are. These crown jewels could include the assets that drive cash flows, competitive advantage and shareholder value. Insiders tend to know what exactly resides on the networks and how to gain access to them for the purpose of theft, disclosure, destruction or indeed manipulation. For example the leaking and disclosure of critical information could lead to the manipulation of share values. This is a far more effective means of profiting through cybercrime than traditional fraud techniques. So how do you tackle this problem of insider threats? The solution is that it must be tackled from two angles, both culturally, in the education of your users, and technologically, by putting further controls, restrictions and monitoring in place on your users – for their own benefit and that of the organization they work for. UserLock is an enterprise security software that controls and secures network access for all authenticated users. UserLock helps organizations - including those within the financial sector - reduce the risks of security breaches from insider threats (intentional or not), offer an immediate response to suspicious user behavior and get compliant with major regulations. ]]>
Thu, 27 Mar 2014 05:25:09 GMT /slideshow/user-lock-insider-threatsfinancial-sector-32801913/32801913 IS_Decisions@slideshare.net(IS_Decisions) Mitigating Insider Threats within the Banking & Financial Sector IS_Decisions When we talk about cybercrime in the Banking & Financial Sector we tend to focus on external threats, but often organisation insiders are more likely to be the source of the breach. In fact you could say insider threats pose a greater risk than external threats as your employees already know where the company’s ‘crown jewels’ are. These crown jewels could include the assets that drive cash flows, competitive advantage and shareholder value. Insiders tend to know what exactly resides on the networks and how to gain access to them for the purpose of theft, disclosure, destruction or indeed manipulation. For example the leaking and disclosure of critical information could lead to the manipulation of share values. This is a far more effective means of profiting through cybercrime than traditional fraud techniques. So how do you tackle this problem of insider threats? The solution is that it must be tackled from two angles, both culturally, in the education of your users, and technologically, by putting further controls, restrictions and monitoring in place on your users – for their own benefit and that of the organization they work for. UserLock is an enterprise security software that controls and secures network access for all authenticated users. UserLock helps organizations - including those within the financial sector - reduce the risks of security breaches from insider threats (intentional or not), offer an immediate response to suspicious user behavior and get compliant with major regulations. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/userlockinsiderthreatsfinancialsector-140327052510-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> When we talk about cybercrime in the Banking &amp; Financial Sector we tend to focus on external threats, but often organisation insiders are more likely to be the source of the breach. In fact you could say insider threats pose a greater risk than external threats as your employees already know where the company’s ‘crown jewels’ are. These crown jewels could include the assets that drive cash flows, competitive advantage and shareholder value. Insiders tend to know what exactly resides on the networks and how to gain access to them for the purpose of theft, disclosure, destruction or indeed manipulation. For example the leaking and disclosure of critical information could lead to the manipulation of share values. This is a far more effective means of profiting through cybercrime than traditional fraud techniques. So how do you tackle this problem of insider threats? The solution is that it must be tackled from two angles, both culturally, in the education of your users, and technologically, by putting further controls, restrictions and monitoring in place on your users – for their own benefit and that of the organization they work for. UserLock is an enterprise security software that controls and secures network access for all authenticated users. UserLock helps organizations - including those within the financial sector - reduce the risks of security breaches from insider threats (intentional or not), offer an immediate response to suspicious user behavior and get compliant with major regulations.
Mitigating Insider Threats within the Banking & Financial Sector from IS Decisions
]]>
924 8 https://cdn.slidesharecdn.com/ss_thumbnails/userlockinsiderthreatsfinancialsector-140327052510-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Windows Network Access Control for Government Traffic Department /slideshow/windows-accesscontrolgovernmentsectorcasestudy/29384493 windows-access-control-government-sector-case-study-131220050543-phpapp02
By restricting, controlling and monitoring network access for over 2000 authorized users, UserLock helps Pernambuco State Traffic Department in Brazil protect sensitive data and mitigate insider threats. Testing the software in their own specific environment, they found that UserLock met exactly the department needs to be able to restrict access of network users, limit access per user, and prevent concurrent logins. The team also found the solution extremely effective in helping with the audits conducted by the organization. In addition, the ability to receive alerts on suspicious access events, coupled to the possibility to take control via remote session when needed, also proved to be a significant plus. UserLock has helped reduce the risk of security breaches to the organization’s data and realize time savings when it comes to monitoring, auditing and reacting to suspicious access events.]]>

By restricting, controlling and monitoring network access for over 2000 authorized users, UserLock helps Pernambuco State Traffic Department in Brazil protect sensitive data and mitigate insider threats. Testing the software in their own specific environment, they found that UserLock met exactly the department needs to be able to restrict access of network users, limit access per user, and prevent concurrent logins. The team also found the solution extremely effective in helping with the audits conducted by the organization. In addition, the ability to receive alerts on suspicious access events, coupled to the possibility to take control via remote session when needed, also proved to be a significant plus. UserLock has helped reduce the risk of security breaches to the organization’s data and realize time savings when it comes to monitoring, auditing and reacting to suspicious access events.]]>
Fri, 20 Dec 2013 05:05:43 GMT /slideshow/windows-accesscontrolgovernmentsectorcasestudy/29384493 IS_Decisions@slideshare.net(IS_Decisions) Windows Network Access Control for Government Traffic Department IS_Decisions By restricting, controlling and monitoring network access for over 2000 authorized users, UserLock helps Pernambuco State Traffic Department in Brazil protect sensitive data and mitigate insider threats. Testing the software in their own specific environment, they found that UserLock met exactly the department needs to be able to restrict access of network users, limit access per user, and prevent concurrent logins. The team also found the solution extremely effective in helping with the audits conducted by the organization. In addition, the ability to receive alerts on suspicious access events, coupled to the possibility to take control via remote session when needed, also proved to be a significant plus. UserLock has helped reduce the risk of security breaches to the organization’s data and realize time savings when it comes to monitoring, auditing and reacting to suspicious access events. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/windows-access-control-government-sector-case-study-131220050543-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> By restricting, controlling and monitoring network access for over 2000 authorized users, UserLock helps Pernambuco State Traffic Department in Brazil protect sensitive data and mitigate insider threats. Testing the software in their own specific environment, they found that UserLock met exactly the department needs to be able to restrict access of network users, limit access per user, and prevent concurrent logins. The team also found the solution extremely effective in helping with the audits conducted by the organization. In addition, the ability to receive alerts on suspicious access events, coupled to the possibility to take control via remote session when needed, also proved to be a significant plus. UserLock has helped reduce the risk of security breaches to the organization’s data and realize time savings when it comes to monitoring, auditing and reacting to suspicious access events.
Windows Network Access Control for Government Traffic Department from IS Decisions
]]>
881 5 https://cdn.slidesharecdn.com/ss_thumbnails/windows-access-control-government-sector-case-study-131220050543-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus /slideshow/risk-frominternalusersbankingcase-studyuser-lockbankofcyprus/29035908 risk-from-internal-users-banking-casestudy-userlock-bank-of-cyprus-131209073939-phpapp02
The following case-study describes how the Bank of Cyprus reduces the security risk from internal users with UserLock. Offering the capability to control user access and react instantly to any related security incident, UserLock helps protect an organization's critical assets by disabling concurrent users' logins, preventing credential sharing and monitoring all session activity in real-time. The result? The Banks IT administrators are empowered with the tools to help secure network access for all users. Since deployment in 2010, UserLock has been expected -and has effectively achieved - to help protect the Bank's critical assets.]]>

The following case-study describes how the Bank of Cyprus reduces the security risk from internal users with UserLock. Offering the capability to control user access and react instantly to any related security incident, UserLock helps protect an organization's critical assets by disabling concurrent users' logins, preventing credential sharing and monitoring all session activity in real-time. The result? The Banks IT administrators are empowered with the tools to help secure network access for all users. Since deployment in 2010, UserLock has been expected -and has effectively achieved - to help protect the Bank's critical assets.]]>
Mon, 09 Dec 2013 07:39:39 GMT /slideshow/risk-frominternalusersbankingcase-studyuser-lockbankofcyprus/29035908 IS_Decisions@slideshare.net(IS_Decisions) Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus IS_Decisions The following case-study describes how the Bank of Cyprus reduces the security risk from internal users with UserLock. Offering the capability to control user access and react instantly to any related security incident, UserLock helps protect an organization's critical assets by disabling concurrent users' logins, preventing credential sharing and monitoring all session activity in real-time. The result? The Banks IT administrators are empowered with the tools to help secure network access for all users. Since deployment in 2010, UserLock has been expected -and has effectively achieved - to help protect the Bank's critical assets. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/risk-from-internal-users-banking-casestudy-userlock-bank-of-cyprus-131209073939-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The following case-study describes how the Bank of Cyprus reduces the security risk from internal users with UserLock. Offering the capability to control user access and react instantly to any related security incident, UserLock helps protect an organization&#39;s critical assets by disabling concurrent users&#39; logins, preventing credential sharing and monitoring all session activity in real-time. The result? The Banks IT administrators are empowered with the tools to help secure network access for all users. Since deployment in 2010, UserLock has been expected -and has effectively achieved - to help protect the Bank&#39;s critical assets.
Risk from internal users in Banking. A Case-Study of UserLock and Bank of Cyprus from IS Decisions
]]>
2142 3 https://cdn.slidesharecdn.com/ss_thumbnails/risk-from-internal-users-banking-casestudy-userlock-bank-of-cyprus-131209073939-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Windows Active Directory Security with IS Decisions /slideshow/windows-active-directory-security-with-is-decisions/28711766 windowsactivedirectorysecuritywithisdecisions-131128092635-phpapp02
Windows Active Directory Security. IS Decisions solutions address specific but very important gaps in managing the security of Microsoft Windows and Active Directory infrastructures. With solutions for user access control, file auditing, server and desktop reporting and remote installations, IS Decisions provides powerful security controls to thwart insider attacks, ensure regulatory compliance and respond instantly to emergency situations.]]>

Windows Active Directory Security. IS Decisions solutions address specific but very important gaps in managing the security of Microsoft Windows and Active Directory infrastructures. With solutions for user access control, file auditing, server and desktop reporting and remote installations, IS Decisions provides powerful security controls to thwart insider attacks, ensure regulatory compliance and respond instantly to emergency situations.]]>
Thu, 28 Nov 2013 09:26:35 GMT /slideshow/windows-active-directory-security-with-is-decisions/28711766 IS_Decisions@slideshare.net(IS_Decisions) Windows Active Directory Security with IS Decisions IS_Decisions Windows Active Directory Security. IS Decisions solutions address specific but very important gaps in managing the security of Microsoft Windows and Active Directory infrastructures. With solutions for user access control, file auditing, server and desktop reporting and remote installations, IS Decisions provides powerful security controls to thwart insider attacks, ensure regulatory compliance and respond instantly to emergency situations. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/windowsactivedirectorysecuritywithisdecisions-131128092635-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Windows Active Directory Security. IS Decisions solutions address specific but very important gaps in managing the security of Microsoft Windows and Active Directory infrastructures. With solutions for user access control, file auditing, server and desktop reporting and remote installations, IS Decisions provides powerful security controls to thwart insider attacks, ensure regulatory compliance and respond instantly to emergency situations.
Windows Active Directory Security with IS Decisions from IS Decisions
]]>
1181 4 https://cdn.slidesharecdn.com/ss_thumbnails/windowsactivedirectorysecuritywithisdecisions-131128092635-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock. /IS_Decisions/oklahoma-citypublicschoolsstopsuserssharingwindowsnetworkloginwithuser-lock oklahoma-city-public-schools-stops-users-sharing-windows-network-login-with-userlock-131016030721-phpapp02
Without a limit on concurrent logins or accurate usage tracking, the IT Team at Oklahoma City Public Schools found students were using logins other than their own to delete or steal files (such as homework) or tamper with shared network apps by deleting primary files. Native security controls in Windows Networks are not enough as they don't limit concurrent logins. With UserLock's login control, the school district were able to customize its user login policy, eliminate concurrent logins and cut IT usage tracking and recovery time by 70%. The district has seen the number of security incidents greatly reduce, including the stealing of homework or personal files and tampering with network apps.]]>

Without a limit on concurrent logins or accurate usage tracking, the IT Team at Oklahoma City Public Schools found students were using logins other than their own to delete or steal files (such as homework) or tamper with shared network apps by deleting primary files. Native security controls in Windows Networks are not enough as they don't limit concurrent logins. With UserLock's login control, the school district were able to customize its user login policy, eliminate concurrent logins and cut IT usage tracking and recovery time by 70%. The district has seen the number of security incidents greatly reduce, including the stealing of homework or personal files and tampering with network apps.]]>
Wed, 16 Oct 2013 03:07:20 GMT /IS_Decisions/oklahoma-citypublicschoolsstopsuserssharingwindowsnetworkloginwithuser-lock IS_Decisions@slideshare.net(IS_Decisions) Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock. IS_Decisions Without a limit on concurrent logins or accurate usage tracking, the IT Team at Oklahoma City Public Schools found students were using logins other than their own to delete or steal files (such as homework) or tamper with shared network apps by deleting primary files. Native security controls in Windows Networks are not enough as they don't limit concurrent logins. With UserLock's login control, the school district were able to customize its user login policy, eliminate concurrent logins and cut IT usage tracking and recovery time by 70%. The district has seen the number of security incidents greatly reduce, including the stealing of homework or personal files and tampering with network apps. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/oklahoma-city-public-schools-stops-users-sharing-windows-network-login-with-userlock-131016030721-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Without a limit on concurrent logins or accurate usage tracking, the IT Team at Oklahoma City Public Schools found students were using logins other than their own to delete or steal files (such as homework) or tamper with shared network apps by deleting primary files. Native security controls in Windows Networks are not enough as they don&#39;t limit concurrent logins. With UserLock&#39;s login control, the school district were able to customize its user login policy, eliminate concurrent logins and cut IT usage tracking and recovery time by 70%. The district has seen the number of security incidents greatly reduce, including the stealing of homework or personal files and tampering with network apps.
Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock. from IS Decisions
]]>
1538 8 https://cdn.slidesharecdn.com/ss_thumbnails/oklahoma-city-public-schools-stops-users-sharing-windows-network-login-with-userlock-131016030721-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
RemoteExec DataSheet /slideshow/datasheet-remoteexec/25591295 datasheet-remoteexec-130826045204-phpapp02
RemoteExec offers IT professionals a feature-rich, enterprise software solution that facilitates and automates tasks associated with remote installations. RemoteExec safeguards the Windows infrastructure by minimizing the response time, workload and risk involved with emergency application deployments, updates and patches.]]>

RemoteExec offers IT professionals a feature-rich, enterprise software solution that facilitates and automates tasks associated with remote installations. RemoteExec safeguards the Windows infrastructure by minimizing the response time, workload and risk involved with emergency application deployments, updates and patches.]]>
Mon, 26 Aug 2013 04:52:03 GMT /slideshow/datasheet-remoteexec/25591295 IS_Decisions@slideshare.net(IS_Decisions) RemoteExec DataSheet IS_Decisions RemoteExec offers IT professionals a feature-rich, enterprise software solution that facilitates and automates tasks associated with remote installations. RemoteExec safeguards the Windows infrastructure by minimizing the response time, workload and risk involved with emergency application deployments, updates and patches. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/datasheet-remoteexec-130826045204-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> RemoteExec offers IT professionals a feature-rich, enterprise software solution that facilitates and automates tasks associated with remote installations. RemoteExec safeguards the Windows infrastructure by minimizing the response time, workload and risk involved with emergency application deployments, updates and patches.
RemoteExec DataSheet from IS Decisions
]]>
580 2 https://cdn.slidesharecdn.com/ss_thumbnails/datasheet-remoteexec-130826045204-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
School Network Security. Camden City School District Case Study /slideshow/school-network-security-camden-city-school-district-case-study/25515418 schoolnetworksecurity-130823054723-phpapp01
Through UserLock’s login control and monitoring capabilities for their Windows network, Camden City School District has been able to completely eliminate login sharing and respond to inappropriate internet and email usage. Keen to improve network security amid an increasing number of students sharing user logins it was extremely difficult to track down students who were abusing the school’s internet usage policies or sending inappropriate emails. There was no way to ascertain who to reprimand as so many students were using the same login. "With UserLock, we no longer have 30 students logged in with the same username at once."]]>

Through UserLock’s login control and monitoring capabilities for their Windows network, Camden City School District has been able to completely eliminate login sharing and respond to inappropriate internet and email usage. Keen to improve network security amid an increasing number of students sharing user logins it was extremely difficult to track down students who were abusing the school’s internet usage policies or sending inappropriate emails. There was no way to ascertain who to reprimand as so many students were using the same login. "With UserLock, we no longer have 30 students logged in with the same username at once."]]>
Fri, 23 Aug 2013 05:47:23 GMT /slideshow/school-network-security-camden-city-school-district-case-study/25515418 IS_Decisions@slideshare.net(IS_Decisions) School Network Security. Camden City School District Case Study IS_Decisions Through UserLock’s login control and monitoring capabilities for their Windows network, Camden City School District has been able to completely eliminate login sharing and respond to inappropriate internet and email usage. Keen to improve network security amid an increasing number of students sharing user logins it was extremely difficult to track down students who were abusing the school’s internet usage policies or sending inappropriate emails. There was no way to ascertain who to reprimand as so many students were using the same login. "With UserLock, we no longer have 30 students logged in with the same username at once." <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/schoolnetworksecurity-130823054723-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Through UserLock’s login control and monitoring capabilities for their Windows network, Camden City School District has been able to completely eliminate login sharing and respond to inappropriate internet and email usage. Keen to improve network security amid an increasing number of students sharing user logins it was extremely difficult to track down students who were abusing the school’s internet usage policies or sending inappropriate emails. There was no way to ascertain who to reprimand as so many students were using the same login. &quot;With UserLock, we no longer have 30 students logged in with the same username at once.&quot;
School Network Security. Camden City School District Case Study from IS Decisions
]]>
2596 8 https://cdn.slidesharecdn.com/ss_thumbnails/schoolnetworksecurity-130823054723-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Information Security in the Banking Sector. A Case Study on UserLock /slideshow/leading-financial-group-user-lock-case-study/24790458 leadingfinancialgroupuserlockcasestudy-130731013019-phpapp02
A Leading Global Banking Group controls network access with UserLock. A case study on how UserLock offers access control, regulatory compliance and risk prevention. Needing to eliminate the opportunity for fraud resulting from users sharing logins, UserLock software eliminates concurrent logins and restricts access to the group's Windows network. A mitigation of risky behavior and insider threat through real-time monitoring of all sessions on the network, enabling an immediate response to any suspicious behavior.]]>

A Leading Global Banking Group controls network access with UserLock. A case study on how UserLock offers access control, regulatory compliance and risk prevention. Needing to eliminate the opportunity for fraud resulting from users sharing logins, UserLock software eliminates concurrent logins and restricts access to the group's Windows network. A mitigation of risky behavior and insider threat through real-time monitoring of all sessions on the network, enabling an immediate response to any suspicious behavior.]]>
Wed, 31 Jul 2013 01:30:19 GMT /slideshow/leading-financial-group-user-lock-case-study/24790458 IS_Decisions@slideshare.net(IS_Decisions) Information Security in the Banking Sector. A Case Study on UserLock IS_Decisions A Leading Global Banking Group controls network access with UserLock. A case study on how UserLock offers access control, regulatory compliance and risk prevention. Needing to eliminate the opportunity for fraud resulting from users sharing logins, UserLock software eliminates concurrent logins and restricts access to the group's Windows network. A mitigation of risky behavior and insider threat through real-time monitoring of all sessions on the network, enabling an immediate response to any suspicious behavior. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/leadingfinancialgroupuserlockcasestudy-130731013019-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A Leading Global Banking Group controls network access with UserLock. A case study on how UserLock offers access control, regulatory compliance and risk prevention. Needing to eliminate the opportunity for fraud resulting from users sharing logins, UserLock software eliminates concurrent logins and restricts access to the group&#39;s Windows network. A mitigation of risky behavior and insider threat through real-time monitoring of all sessions on the network, enabling an immediate response to any suspicious behavior.
Information Security in the Banking Sector. A Case Study on UserLock from IS Decisions
]]>
2711 6 https://cdn.slidesharecdn.com/ss_thumbnails/leadingfinancialgroupuserlockcasestudy-130731013019-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
FileAudit Presentation | Windows File System Auditing /slideshow/fileaudit-presentation-24499410/24499410 fileaudit-presentation-130722101427-phpapp01
With a simple, agentless deployment, IT Managers can quickly install FileAudit and instantly protect all file servers in their Windows environment. FileAudit makes monitoring, auditing and securing files and folders intuitive and easy. Protect your most sensitive files and confidential information stored on Windows servers.]]>

With a simple, agentless deployment, IT Managers can quickly install FileAudit and instantly protect all file servers in their Windows environment. FileAudit makes monitoring, auditing and securing files and folders intuitive and easy. Protect your most sensitive files and confidential information stored on Windows servers.]]>
Mon, 22 Jul 2013 10:14:27 GMT /slideshow/fileaudit-presentation-24499410/24499410 IS_Decisions@slideshare.net(IS_Decisions) FileAudit Presentation | Windows File System Auditing IS_Decisions With a simple, agentless deployment, IT Managers can quickly install FileAudit and instantly protect all file servers in their Windows environment. FileAudit makes monitoring, auditing and securing files and folders intuitive and easy. Protect your most sensitive files and confidential information stored on Windows servers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fileaudit-presentation-130722101427-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With a simple, agentless deployment, IT Managers can quickly install FileAudit and instantly protect all file servers in their Windows environment. FileAudit makes monitoring, auditing and securing files and folders intuitive and easy. Protect your most sensitive files and confidential information stored on Windows servers.
FileAudit Presentation | Windows File System Auditing from IS Decisions
]]>
3286 6 https://cdn.slidesharecdn.com/ss_thumbnails/fileaudit-presentation-130722101427-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
UserLock Presentation | Access Security for Windows Networks /IS_Decisions/userlock-presentation-24248709 userlockpresentation-130715090421-phpapp01
UserLock is a unique enterprise software solution that sets and enforces a customized User Access Policy. Deliver a new level of security for your Windows & Active Directory networks. ]]>

UserLock is a unique enterprise software solution that sets and enforces a customized User Access Policy. Deliver a new level of security for your Windows & Active Directory networks. ]]>
Mon, 15 Jul 2013 09:04:20 GMT /IS_Decisions/userlock-presentation-24248709 IS_Decisions@slideshare.net(IS_Decisions) UserLock Presentation | Access Security for Windows Networks IS_Decisions UserLock is a unique enterprise software solution that sets and enforces a customized User Access Policy. Deliver a new level of security for your Windows & Active Directory networks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/userlockpresentation-130715090421-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> UserLock is a unique enterprise software solution that sets and enforces a customized User Access Policy. Deliver a new level of security for your Windows &amp; Active Directory networks.
UserLock Presentation | Access Security for Windows Networks from IS Decisions
]]>
3774 3 https://cdn.slidesharecdn.com/ss_thumbnails/userlockpresentation-130715090421-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
FileAudit Datasheet /slideshow/file-audit-datasheet/24175455 fileauditdatasheet-130712081851-phpapp01
Proactively track, audit, report and alert on all access to files and folders on Windows servers.]]>

Proactively track, audit, report and alert on all access to files and folders on Windows servers.]]>
Fri, 12 Jul 2013 08:18:51 GMT /slideshow/file-audit-datasheet/24175455 IS_Decisions@slideshare.net(IS_Decisions) FileAudit Datasheet IS_Decisions Proactively track, audit, report and alert on all access to files and folders on Windows servers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fileauditdatasheet-130712081851-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Proactively track, audit, report and alert on all access to files and folders on Windows servers.
FileAudit Datasheet from IS Decisions
]]>
463 2 https://cdn.slidesharecdn.com/ss_thumbnails/fileauditdatasheet-130712081851-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Blanc http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
UserLock Datasheet /slideshow/userlock-datasheet-24175444/24175444 userlockdatasheet-130712081834-phpapp01
UserLock is a unique enterprise software solution that sets and enforces a customized User Access Policy. Deliver a new level of security for your Windows & Active Directory networks. ]]>

UserLock is a unique enterprise software solution that sets and enforces a customized User Access Policy. Deliver a new level of security for your Windows & Active Directory networks. ]]>
Fri, 12 Jul 2013 08:18:34 GMT /slideshow/userlock-datasheet-24175444/24175444 IS_Decisions@slideshare.net(IS_Decisions) UserLock Datasheet IS_Decisions UserLock is a unique enterprise software solution that sets and enforces a customized User Access Policy. Deliver a new level of security for your Windows & Active Directory networks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/userlockdatasheet-130712081834-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> UserLock is a unique enterprise software solution that sets and enforces a customized User Access Policy. Deliver a new level of security for your Windows &amp; Active Directory networks.
UserLock Datasheet from IS Decisions
]]>
348 2 https://cdn.slidesharecdn.com/ss_thumbnails/userlockdatasheet-130712081834-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Blanc http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
8 Holes in Windows Login Controls /slideshow/8-holes-in-windows-login-controls/8271541 8holesinwindowslogincontrols-110610091617-phpapp02
Windows has more security features than any other operating system but is strangely lacking the fundamental and classic login session controls found in other environment like mainframe and midrange systems, UNIX and Netware.]]>

Windows has more security features than any other operating system but is strangely lacking the fundamental and classic login session controls found in other environment like mainframe and midrange systems, UNIX and Netware.]]>
Fri, 10 Jun 2011 09:16:14 GMT /slideshow/8-holes-in-windows-login-controls/8271541 IS_Decisions@slideshare.net(IS_Decisions) 8 Holes in Windows Login Controls IS_Decisions Windows has more security features than any other operating system but is strangely lacking the fundamental and classic login session controls found in other environment like mainframe and midrange systems, UNIX and Netware. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/8holesinwindowslogincontrols-110610091617-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Windows has more security features than any other operating system but is strangely lacking the fundamental and classic login session controls found in other environment like mainframe and midrange systems, UNIX and Netware.
8 Holes in Windows Login Controls from IS Decisions
]]>
934 1 https://cdn.slidesharecdn.com/ss_thumbnails/8holesinwindowslogincontrols-110610091617-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
RemoteExec Presentation /slideshow/remoteexec-presentation/8107763 remoteexecpresentation-110526033726-phpapp01
RemoteExec remotely installs applications, executes programs/scripts and updates files and folders on Windows systems throughout the network.]]>

RemoteExec remotely installs applications, executes programs/scripts and updates files and folders on Windows systems throughout the network.]]>
Thu, 26 May 2011 03:37:21 GMT /slideshow/remoteexec-presentation/8107763 IS_Decisions@slideshare.net(IS_Decisions) RemoteExec Presentation IS_Decisions RemoteExec remotely installs applications, executes programs/scripts and updates files and folders on Windows systems throughout the network. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/remoteexecpresentation-110526033726-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> RemoteExec remotely installs applications, executes programs/scripts and updates files and folders on Windows systems throughout the network.
RemoteExec Presentation from IS Decisions
]]>
611 1 https://cdn.slidesharecdn.com/ss_thumbnails/remoteexecpresentation-110526033726-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
IS Decisions in the NUMB3RS /IS_Decisions/is-decisions-in-the-numb3rs isdecisionsinthenumbers-110526033656-phpapp02
Well, this is a (hopefully) funny way to introduce ourselves ...]]>

Well, this is a (hopefully) funny way to introduce ourselves ...]]>
Thu, 26 May 2011 03:36:52 GMT /IS_Decisions/is-decisions-in-the-numb3rs IS_Decisions@slideshare.net(IS_Decisions) IS Decisions in the NUMB3RS IS_Decisions Well, this is a (hopefully) funny way to introduce ourselves ... <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/isdecisionsinthenumbers-110526033656-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Well, this is a (hopefully) funny way to introduce ourselves ...
IS Decisions in the NUMB3RS from IS Decisions
]]>
861 1 https://cdn.slidesharecdn.com/ss_thumbnails/isdecisionsinthenumbers-110526033656-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
IS Decisions Company Presentation /slideshow/is-decisions-company-presentation-8107753/8107753 isdecisionscompanypresentation-110526033627-phpapp01
IS Decisions, founded in 2000 and based in Biarritz (France), is a Software Vendor specializing in Infrastructure and Security Management solutions for Microsoft Windows. Software solutions developed for Network Administrators: - secure, monitor and report on network access and user sessions - audit access to sensitive files and folders - perform remote installations of applications and updates across the network - automate the inventory of Windows assets (hardware, software, settings, eventlogs) More than 3,000 clients worldwide trust IS Decisions: Airbus, American Express, AXA, Banco Santander, Bank of Tokyo, Barclays, Boeing, Citizen, Ernst & Young, GlaxoSmithKline, Hewlett-Packard, HSBC, Konica, IBM, Lockheed Martin, L’Oréal, Microsoft, Mitsubishi, Saint Gobain, Siemens, Smurfit Stone, Texas A&M University, Time Warner, United Nations, University of Cambridge, University of Pennsylvania, US Department of Justice, US Air Force, US Army, US Navy, Virgin, … IS Decisions is a Microsoft Partner Silver Independent Software Vendor.]]>

IS Decisions, founded in 2000 and based in Biarritz (France), is a Software Vendor specializing in Infrastructure and Security Management solutions for Microsoft Windows. Software solutions developed for Network Administrators: - secure, monitor and report on network access and user sessions - audit access to sensitive files and folders - perform remote installations of applications and updates across the network - automate the inventory of Windows assets (hardware, software, settings, eventlogs) More than 3,000 clients worldwide trust IS Decisions: Airbus, American Express, AXA, Banco Santander, Bank of Tokyo, Barclays, Boeing, Citizen, Ernst & Young, GlaxoSmithKline, Hewlett-Packard, HSBC, Konica, IBM, Lockheed Martin, L’Oréal, Microsoft, Mitsubishi, Saint Gobain, Siemens, Smurfit Stone, Texas A&M University, Time Warner, United Nations, University of Cambridge, University of Pennsylvania, US Department of Justice, US Air Force, US Army, US Navy, Virgin, … IS Decisions is a Microsoft Partner Silver Independent Software Vendor.]]>
Thu, 26 May 2011 03:36:25 GMT /slideshow/is-decisions-company-presentation-8107753/8107753 IS_Decisions@slideshare.net(IS_Decisions) IS Decisions Company Presentation IS_Decisions IS Decisions, founded in 2000 and based in Biarritz (France), is a Software Vendor specializing in Infrastructure and Security Management solutions for Microsoft Windows. Software solutions developed for Network Administrators: - secure, monitor and report on network access and user sessions - audit access to sensitive files and folders - perform remote installations of applications and updates across the network - automate the inventory of Windows assets (hardware, software, settings, eventlogs) More than 3,000 clients worldwide trust IS Decisions: Airbus, American Express, AXA, Banco Santander, Bank of Tokyo, Barclays, Boeing, Citizen, Ernst & Young, GlaxoSmithKline, Hewlett-Packard, HSBC, Konica, IBM, Lockheed Martin, L’Oréal, Microsoft, Mitsubishi, Saint Gobain, Siemens, Smurfit Stone, Texas A&M University, Time Warner, United Nations, University of Cambridge, University of Pennsylvania, US Department of Justice, US Air Force, US Army, US Navy, Virgin, … IS Decisions is a Microsoft Partner Silver Independent Software Vendor. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/isdecisionscompanypresentation-110526033627-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> IS Decisions, founded in 2000 and based in Biarritz (France), is a Software Vendor specializing in Infrastructure and Security Management solutions for Microsoft Windows. Software solutions developed for Network Administrators: - secure, monitor and report on network access and user sessions - audit access to sensitive files and folders - perform remote installations of applications and updates across the network - automate the inventory of Windows assets (hardware, software, settings, eventlogs) More than 3,000 clients worldwide trust IS Decisions: Airbus, American Express, AXA, Banco Santander, Bank of Tokyo, Barclays, Boeing, Citizen, Ernst &amp; Young, GlaxoSmithKline, Hewlett-Packard, HSBC, Konica, IBM, Lockheed Martin, L’Oréal, Microsoft, Mitsubishi, Saint Gobain, Siemens, Smurfit Stone, Texas A&amp;M University, Time Warner, United Nations, University of Cambridge, University of Pennsylvania, US Department of Justice, US Air Force, US Army, US Navy, Virgin, … IS Decisions is a Microsoft Partner Silver Independent Software Vendor.
IS Decisions Company Presentation from IS Decisions
]]>
452 1 https://cdn.slidesharecdn.com/ss_thumbnails/isdecisionscompanypresentation-110526033627-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
WinReporter Presentation /IS_Decisions/winreporter-presentation winreporterpresentation-110526033524-phpapp02
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports. ]]>

WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports. ]]>
Thu, 26 May 2011 03:35:22 GMT /IS_Decisions/winreporter-presentation IS_Decisions@slideshare.net(IS_Decisions) WinReporter Presentation IS_Decisions WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/winreporterpresentation-110526033524-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
WinReporter Presentation from IS Decisions
]]>
505 1 https://cdn.slidesharecdn.com/ss_thumbnails/winreporterpresentation-110526033524-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
https://cdn.slidesharecdn.com/profile-photo-IS_Decisions-48x48.jpg?cb=1644598041 IS Decisions, founded in 2000 and based in Biarritz (France), is a software vendor specializing in Infrastructure and Security Management solutions for Microsoft Windows. www.isdecisions.com https://cdn.slidesharecdn.com/ss_thumbnails/stop-blaming-your-users-for-compromised-credentials-161205155502-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/security-breaches-from-compromised-user-logins/69839365 Security Breaches from... https://cdn.slidesharecdn.com/ss_thumbnails/userlock-9-technical-presentation-160623072954-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/userlock-9-technical-presentation/63365175 UserLock 9 Technical P... https://cdn.slidesharecdn.com/ss_thumbnails/isdecisionspresentation-140514104611-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/is-decisions-company-overview/34678975 IS Decisions Company O...