Blog, ISDecision Blog
Simplify MFA & Session Management With the New, Intuitive UserLock Web App | IS Decisions
Originally published by IS Decisions. The UserLock Web App allows IT teams to easily, quickly monitor, respond to, and report on MFA and network session activity – from anywhere.
Read MoreBlog, ISDecision Blog
Meet Salesforce MFA Requirements via SSO With Active Directory Identities | IS Decisions
Originally published by IS Decisions. This article explains how UserLock can deliver SSO and MFA access to Salesforce from anywhere for on-premise Active Directory identities.
Read MoreBlog, ISDecision Blog
Master Your Data Lifecycle to Improve Data Security | IS Decisions
Originally published by IS Decisions. A data lifecycle is hard to pin down. Depending on your industry or profession, what makes up a data lifecycle can vary widely. When it comes to cybersecurity, a more concrete, not to mention secure, and comprehensive approach is necessary to ensure data security.
Read MoreBlog, ISDecision Blog
Secure SSO for Cloud Access Using Existing On-Premise Active Directory Identities | IS Decisions
Originally published by IS Decisions. The new release of UserLock 11 provides secure single sign-on (SSO) for existing on-premises Active Directory (AD) identities, extending access protection to the cloud. Combined with enhanced multi-factor authentication (MFA) and remote access controls, this new release completes UserLock’s comprehensive security solution.
Read MoreBlog, ISDecision Blog
What’s New for UserLock 11 | IS Decisions
Originally published by IS Decisions. UserLock is the go-to access management solution for on-premises and hybrid Active Directory (AD) organizations of any size.
Read MoreBlog, ISDecision Blog
Why Using SMS Authentication for 2FA Is Not Secure | IS Decisions
SMS two-factor authentication is one of the most widespread types of multi-factor authentication (MFA). You don’t need any apps or digital keys, and it’s not tied to a specific ecosystem. Unfortunately, it’s also not a secure MFA method.
Read MoreBlog, ISDecision Blog
Stop the Frustration and Risk of Unchecked Access to Files and Folders | IS Decisions
Following the recent updates to FileAudit, the article discuss how automated responses to file moves, deletions and other access events can help SMBs, and the MSPs that service them, protect sensitive data from theft, alteration and loss. Originally published by IS Decisions.
Read MoreBlog, ISDecision Blog
Hybrid Cloud Storage Protection for MSPs | IS Decisions
Cyber threats such as ransomware, identity theft, and data exfiltration, which traditionally target on-premise resources are now a growing problem for cloud storage services. As companies continue to deploy resources to the cloud, the need to address these additional security challenges is a major concern.
Read MoreBlog, ISDecision Blog
Addressing User Access in IT Security Compliance | IS Decisions
The risks of non-compliance are not worth taking. You face fines and even imprisonment — not to mention that non-compliance could lead to a serious data breach that might ultimately lose you clients and damage your reputation.
Read MoreBlog, ISDecision Blog
Why your VPN connections need two-factor authentication | IS Decisions
Businesses who have moved to the cloud for storage are finding it harder to detect unauthorized access to company files and folders. The ease of sharing data among teams and simple integrations their storage can have with other cloud applications significantly increases the prospect of unauthorized access.
Read MoreBlog, ISDecision Blog
Protecting Active Directory logins for remote working | IS Decisions
Businesses who have moved to the cloud for storage are finding it harder to detect unauthorized access to company files and folders. The ease of sharing data among teams and simple integrations their storage can have with other cloud applications significantly increases the prospect of unauthorized access.
Read MoreBlog, ISDecision Blog
Why SMBs believe their data is unsafe in the cloud | IS Decisions
Businesses who have moved to the cloud for storage are finding it harder to detect unauthorized access to company files and folders. The ease of sharing data among teams and simple integrations their storage can have with other cloud applications significantly increases the prospect of unauthorized access.
Read MoreBlog, ISDecision Blog
Understanding the “After Ransomware” helps MSPs protect against it | IS Decisions
Advertisements might seem like something that poses no risks to your organization. However, having an ad blocker has more utility in your organization than you might think.
Read MoreISDecision Blog, Webinar
ISDecisions Webinar | Stop cyber-attacks with Multi-Factor Authentication
Join Kate Fleming, the Technical Sales Manager at IS Decisions, and find out how to stop cyber-attacks with Multi-Factor Authentication.
Read MoreBlog, ISDecision Blog, Release Automation
What’s new in FileAudit 6 ? Now monitor files on the Cloud !
Traditionally, FileAudit monitored files and folders on Windows Active Directory-based servers, but with the release of Version 6.0, IS Decisions has extended FileAudit’s monitoring capabilities to major cloud file storage providers.
Read More