Results
No result found.
Access management
- Access management
IP access control: Unmasking the real IP address
UserLock ensures your access controls are applied on the client's true IP address, even when an IP proxy is in place.
Read - Access management
Secure remote access to Active Directory
A guide to securing remote access to Active Directory for your on-premise Active Directory identities. Close common security gaps for a hybrid or fully remote workforce with UserLock.
Read - Access management
How AI makes password-based authentication even weaker (and what to do about it)
Understand how AI makes password-based authentication weaker, so you can proactively address vulnerabilities.
Read - Access management
Is there a case for keeping identity authentication on premise?
Identity plays a key role in the on premise vs. cloud debate. Here's when it makes sense to keep identity authentication on premises.
Read - Access management
How to secure cloud access starting with on-premise Active Directory? Implement SSO and MFA
If Active Directory (AD) is the backbone of your infrastructure, your AD security shouldn't be an afterthought. With single sign-on (SSO) and multi-factor authentication (MFA) for Active Directory, on-premise Active Directory environments can allow access to cloud resources — without compromising security.
Read - Access management
IAM & remote access security
Identity access management (IAM) is essential to remote access security. Learn how to protect remote access to both network and cloud environments with an existing Active Directory environment.
Read - Access management
Securing access to on-premises Microsoft Exchange server
Need to secure employee access to an on-premises Microsoft Exchange server? Learn what solutions protect exchange access for Active Directory environments.
Read - Access management
Remote work: Secure off-network, off-domain connections
Remote users don’t always connect to the corporate network, or even the internet. Here’s how UserLock’s multi-factor authentication (MFA) and access controls safeguard off-network, off-domain access.
Read - Access management
Addressing user access in IT security compliance
Regulators are placing more importance on the user side of security and are strengthening compliance requirements accordingly. UserLock helps you to go above and beyond many compliance requirements with specific, granular, and configurable user authentication rules and monitoring.
Read - Access management
How to develop a sound access management strategy in Azure Active Directory?
Improve your Azure Active Directory access-management protocols to protect sensitive data with these tips and tricks.
Read - Access management
Active Directory access management is key to prevent a breach
Strong Active Directory access management is key to better secure user credentials and protect against a network breach.
Read - Access management
Comprehensive guide to Windows domain 2 factor authentication (2FA)
Securing access to your Windows domain is paramount. Implementing Windows domain 2 factor authentication (2FA) with Active Directory not only bolsters security but also ensures compliance. With UserLock, deploying 2FA is streamlined and effective, protecting access across all session types including RDP, VPN, IIS, and SaaS.
Read - Access management
Remote work security for VPN and RDP sessions
Remote work creates big cybersecurity problems that put sensitive corporate data at risk. Learn how to secure two of the most vulnerable issues: user access via VPN and RDP sessions.
Read - Access management
Login logout time tracking for employees
Learn how UserLock makes it easy to manage and react to employees’ attendance, overtime thresholds, productivity and suspicious login logout times.
Read - Access management
Windows Group Policy for login security
Windows Group Policies can be tedious to configure for logon and access policies. Here's how UserLock takes the strain out of administering and securing login access.
Read - Access management
How to secure Active Directory logins in remote work environments
The boom in working from home has become a bonanza for cyber attackers. Boost your corporate's network security by protecting the remote use of Active Directory credentials.
Read - Access management
4 steps to stronger access control management
Why you need granular access controls and a quick response to when, where and how authorized users can access your Windows network.
Read - Access management
Force remote logoff after idle time
Watch how IT administrators can set an automatic forced logoff, on all locked or open machines, after a certain idle time with UserLock. This includes remote desktop sessions opened by the domain user.
Read - Access management
Manage call center access to a Windows network: Avoid these 4 barriers
Agents and customer service representatives have access to vast amounts of sensitive data. Avoid these 4 common barriers when it comes to managing access.
Read - Access management
Privileged access management for Windows Active Directory domain
Privileged access management (PAM) for Windows Active Directory domain accounts isn't always easy. That’s where UserLock comes in, making it easier to protect any account with privileged access while also enhancing the security of all privileged accounts.
Read - Access management
The case for logon management in education
Misuse of user credentials is rampant. That’s why the principal of least privilege puts the focus on managing access from all users, not just privileged accounts.
Read - Access management
How to track Active Directory user login history and audit logins
Learn how to audit Active Directory user login history effectively with UserLock. Get centralized, real-time reports on all successful and failed login attempts.
Read - Access management
Permissions, accounts or logons: Where do you draw the line for least privilege?
Identify privilege anomolies and allow IT to respond, before a breach takes place, by implementing least privilege for access management at the logon.
Read - Access management
Least privilege and the value of managing all user logons
With the rampant misuse of user credentials. the principle of least privilege (PoLP) encourages managing access for all users, not just privileged accounts.
Read