Beruflich Dokumente
Kultur Dokumente
ORIGIN TIME
Limit access by location with Limit access to specific
controls at workstation, device, IP timeframes and set daily, weekly
CONTEXT-AWARE RESTRICTIONS range, organizational unit (OU), or monthly time quotas,
department, floor and building maximum session times and idle
Working alongside Active Directory to extend its
levels. session time.
security, UserLock can apply customized login
restrictions by user, group or organizational unit (OU).
Any logon attempts that don’t satisfy these conditions
are automatically blocked.
WEBHOOK NOTIFICATIONS Feed granular logon data into your SIEM solution for more accurate analysis.
UserLock allows you to push updates directly to other
Feed granular logon data into time and attendance systems to accurately log
applications right when they happen, opening up new
employees hours and overtime.
automation possibilities. It allows real-time logon
notifications to be integrated into other applications or Integrate UserLock with software applications to allow line managers to easily
monitoring platforms, and custom workflows can be authorize temporary time extensions for any specific user.
built based on specific access events.
Trigger real time processes such as blocking a user in Active Directory
following a suspicious logon event.
Every user connection event - and logon attempt – will
be notified to the webhook URL alongside all user and Integrate granular logon data with physical access control systems to better
machine details associated with the event (IP address, control employee’s access to doorways or other entrance portals. (I.e. an
attempted access to a building using a compromised badge would be
session type, time, etc.)
unsuccessful if the user is currently already logged on at their desktop).
TO COME
GEOLOCATION MULTIFACTOR
AUTHENTICATION
INFRASTRUCTURE
UserLock works alongside Active Directory
in a Microsoft Windows Environment
EASY TO USE
No training is necessary
NON-DISRUPTIVE TECHNOLOGY
No modification is made to Active Directory
COST/BENEFIT ANALYSIS
AVOID THE COST OF A DATA BREACH AVOID THE COST OF CHASING FALSE
Immediately stop the threat before they POSITIVES
take action Automated access controls help avoid false
Security should identify the potential threat as early in the positives
attack process as possible. The earlier detection occurs, the
less damage any threat actor (whether internal or external) The dreaded part of any security solution is the potential for a
can do. Unlike security solutions that require an attacker to storm of alerts that turn out to be false positives. If something
perform some kind of inappropriate and damaging action, should fall outside of established policies and restrictions,
UserLock acts before any access is achieved and before UserLock automatically takes action before damage is done –
damage is done. not only when IT intervenes.
The average cost of a data breach per compromised record is Companies now waste an average of 425 hours a week*
$148* and the mean time to identify a breach is 197 days. responding to false positives.
Global Payments and Heartland Payment Systems, both *The Cost of Insecure Endpoints – Ponemon Institute
reportedly spent over $100 million each to contain and
correct data breaches within their organizations.
*2018 Cost of a Data Breach Study from Ponemon Institute
COST/BENEFIT ANALYSIS (2/4)
AVOID THE COST TO USER REDUCED COST OF LARGE BUILD ON YOUR INVESTMENT
PRODUCTIVITY SCALE DEPLOYMENTS IN ACTIVE DIRECTORY
Easy adoption and no additional Scale effortlessly Reduce complexity
security steps for the user
UserLock integrates seamlessly with the With non-disruptive technology that’s simple to
logon process and is adaptive to existing implement and intuitive to use, UserLock works
Security should not overwhelm and stifle
Active Directory structure. Controls can be alongside your existing infrastructure – and
productivity. UserLock offers security behind
applied at Active Directory Group levels for investment in Active Directory. An important
the scenes, protecting the users and the
general protection of large user bases and differentiator of UserLock is it requires no
environment until the moment the user is truly
augmented with individual user rules. A modifications to AD accounts, its structure or its
conflicting with security protocol. No end-user
scalable deployment engine makes schema.
training making implementation easy.
implementation easy and less time
consuming.
COST/BENEFIT ANALYSIS (3/4)
SAVE TIME (AND COST) AUDITING USERS SAVE TIME (AND COST) IN MANAGING
Centralized auditing and automated reporting USERS & RESOURCES
Reduce the time and cost spent monitoring and auditing users’ Remote session management
access by up to 90%*. A comprehensive, centralized and
searchable audit trail makes it easy to perform accurate forensics Rather than investing in another tool, UserLock administrators
or prove regulatory compliance – freeing up time and resources can interact remotely with any session to lock the console, log off
for other critical tasks. the user or even block them from further logons. This further
protects the network, optimizes shared resources, and improves
Webhooks make it possible to feed UserLock’s event data into network performance and the associated financial costs. It also
an SIEM solution for more accurate analysis and improved saves administrators valuable time when managing a large number
security. of users.
Wilde Ho
IT Manager at Angliss
LEARN MORE ABOUT USERLOCK