Today IS Decisions are pleased to announce a significant update to its flagship solution UserLock.
UserLock 9.5 is the first version of the software in the company’s history to secure user logins from Mac computers. The launch comes at a time where Macs are replacing PCs at an ‘unprecedented rate’ according to Jamf’s 2016 Managing Apple Devices in the Enterprise report.
User Logins are the pivotal point across all security strategies. It is at this point in user activity that indicates compromise and is the appropriate point to eliminate this threat.
UserLock helps businesses to secure all employee access to corporate networks. Using context-aware technology, UserLock enables IT administrators to restrict access to several variables, including device, workstation, IP address, time of the day and session type (interactive, WiFI, VPN and IIS sessions). This kind of restriction helps to prevent businesses falling victim to phishing attacks and the insider threat by rendering genuine employee login credentials useless to would-be attackers.
Within the update, we have also made further improvements to UserLock’s built-in reporting feature. IT administrators can now generate pre-defined reports on concurrent logins, IIS session history, and denied login attempts by Active Directory and/or UserLock’s own access restrictions.
CEO and founder of IS Decisions, François Amigorena, said: “Launching UserLock for enterprise Mac users is an important strategic step for us. We recognize that more and more organizations are using Macs, but are still at risk from cyberattacks thanks to poor login security.”
“This kind of software would’ve helped prevent the high-profile attacks that happened to the likes of Dropbox, Sage, Sony, eBay, Anthem and many others where attackers gained entry to corporate systems by simply using an employee login.”
The post UserLock now supports both Windows and Mac computers appeared first on Enterprise Network Security Blog from ISDecisions.
This is a Security Bloggers Network syndicated blog post authored by Chris Bunn. Read the original post at: Enterprise Network Security Blog from ISDecisions