Windows File Auditing Log and more with FileAudit
FileAudit is an intuitive tool that simplifies native Windows file auditing log. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to...
View ArticleYubikey 2 Factor Authentication for Windows Logins
UserLock makes it easy for a business to enable two-factor authentication on Windows accounts, managed by Active Directory. Watch how UserLock works with YubiKey – the hardware security keys...
View ArticleWindows Logon Audit Far Beyond Native Windows Security
Windows logon auditing is an important activity for diverse security and compliance needs. Businesses may require a full and accurate logon audit to: perform accurate forensics demonstrate they are...
View ArticleWhy your VPN connections need two-factor authentication (2FA)
Virtual private networks (VPNs) are very popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between...
View ArticleWindows Domain 2 Factor Authentication (2FA)
Windows domains and Active Directory (AD) makes it easy for administrators to control a large number of business PCs and devices from a central location. Today, a huge percentage of enterprises...
View ArticleUnderstanding the “After Ransomware” helps MSPs protect against it
Today we have all unfortunately heard about this type of criminal moneymaking scheme. We know – more or less – how to catch it, what happens during the ransomware attack, but we have much less...
View ArticleRDP Gateway MFA
Multi-factor authentication (MFA) for Remote Desktop Gateway and RDP connections should be very high on your security to-do list. Some or even your entire workforce might now be dispersed but their...
View ArticleSecure SSO for Cloud Applications using existing on premise Active Directory...
The new release of UserLock 11 provides existing on-premise Active Directory (AD) Identities with secure Single Sign-On (SSO) access to both the corporate network and multiple cloud applications, from...
View ArticleAddressing User Access in IT Security Compliance
The risks of non-compliance are not worth taking. You face fines and even imprisonment — not to mention that non-compliance could lead to a serious data breach that might ultimately lose you clients...
View ArticleCyber Liability Insurance and MFA on Internal and Remote Access
Cyber insurance is driving a long-overdue improvement in user access security. Multi-factor authentication (MFA) is fast becoming a requirement for all privilege and non-privilege accounts, whether...
View ArticleHybrid Cloud Storage Protection for MSPs
Cyber threats such as ransomware, identity theft, and data exfiltration, which traditionally target on-premise resources are now a growing problem for cloud storage services. As companies continue to...
View ArticleTechni Team appointed exclusive distributor of UserLock MFA for the Netherlands
A next step in their ambition to make a difference in IT-Security for Dutch SMEs Full-service ICT-supplier Techni Team ICT BV (Veenendaal, NL) and IS Decisions SA (Bidart, France) have entered into a...
View ArticleStop the Frustration and Risk of Unchecked Access to Files and Folders
Following the recent updates to FileAudit, we discuss how automated responses to file moves, deletions and other access events can help SMBs, and the MSPs that service them, protect sensitive data...
View ArticleMulti Factor Authentication in a Holistic Context
The following is a guest post from Techni Team, an ICT-Full-Service Provider and the distributor for UserLock in the Netherlands. As many of you are aware, that when it comes to protecting the ICT...
View ArticleWhy Using SMS Authentication for 2FA Is Not Secure
Two-factor authentication (2FA) is now a part of daily life, and most of us have had first-hand experience with SMS authentication. You enter your password, then you get a prompt to enter a code or...
View ArticleIs It Paranoia If It’s Real? Know These Insider Threat Indicators
“Just because you’re paranoid doesn’t mean they’re not out to get you.” More than just a great Nirvana lyric, this also sounds like an apt mantra for modern-day cybersecurity. Because if...
View ArticleMaster Your Data Lifecycle to Improve Data Security
A data lifecycle is hard to pin down. Depending on your industry or profession, what makes up a data lifecycle can vary widely. For example, Harvard Business School claims there are eight data life...
View ArticleMeet Salesforce MFA Requirements via SSO With Active Directory Identities
This article explains how UserLock can deliver SSO and MFA access to Salesforce from anywhere for on-premise Active Directory identities. In response to the global threat landscape, Salesforce now...
View ArticleSimplify MFA & Session Management With the New, Intuitive UserLock Web App
The UserLock Web App allows IT teams to easily, quickly monitor, respond to, and report on MFA and network session activity – from anywhere. Now available in UserLock 11.2, the UserLock Web App...
View ArticleStand Down, Marketers: Zero Trust is Not a Product
Thanks to relentless marketing, Zero Trust is quickly turning into another buzzword. It’s time security professionals claim to the term. Once and for all: Zero Trust is not a product, it’s a security...
View Article
More Pages to Explore .....