UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.


Be the first to review this product

Pricing   Contact us for Quote
SoftwareAsia SKU   USRLCK6
Publisher's SKU   USRLCK6P


UserLock Benefits

Significantly reduce the attack surface of your Windows network

Significantly reduce the attack surface of your Windows network
Logins are the first line of defense of your network. UserLock provides and enforces granular rules and policies to control and secure network access. With UserLock, you will be able to control “When”“Where” and “How Long” your users access resources on your Information System.
Enforce compliance with major regulations

Enforce compliance with major regulations
Compliance regulations generate a heavy workload for IT administrators who must perform digital records management.
UserLock provides specific features to identify, search, report and archive user access for compliance to major industry regulations, including HIPAA, NIST 800-53, Sarbanes-Oxley, NISPOM Chapter 8, PCI,Bâle II, ICD 503.
Optimize workstation usage

Optimize workstation usage
In a time of budget constraints, investing in additional machines for free access computer rooms is difficult to justify.
UserLock provides an interface to see which machines are available, how much each machine has been used and ensures fair sharing of computer resources.
Efficiently mitigate insider threat

Efficiently mitigate insider threat
UserLock allows you to monitor in real-time all sessions on your network and to immediately respond to suspicious or disruptive behavior.
In case of such behavior, administrators can remotely lock, logoff and reset sessions.
Perform accurate IT forensics

Perform accurate IT forensics
UserLock records all session logging and locking events in an ODBC database and gives IT administrators the ability to support accountability, legal investigations, and internal trends analysis.
If an IT security breach occurs, UserLock will provide accurate, detailed information about who was connected, from which system(s), since what time, for how long, etc.

For more details, please visit :
Product Name Price Qty
Contact Us For Quote
Access Control Management
With UserLock, IT can set and enforce a controlled user access policy that will automatically permit or deny user logins. Based on multiple criteria that support an organization’s policies UserLock can control user access to protect a Windows Active Directory network and all of the data contained within.

Access Restrictions for Wi-Fi, VPN and IIS Sessions
Access restrictions take into consideration different session types (including Wi-Fi, VPN and IIS sessions) to meet the demands of a remote and mobile workforce. Help control a wireless network, secure BYOD environments and control access to email off-premises.

Limit Concurrent Logins
The ability to prevent or limit concurrent or multiple logins, averts one of the most potentially dangerous situations for a Windows Active Directory network. UserLock controls concurrent sessions and sets limitations in a granular way according to user, user groups, organizational units and session types.

Restrict & Enforce User Logon to Workstation, Device or IP Address
Control, restrict and enforce where users may logon. Restrict users to workstation or device, IP range, department, floor or building. Go beyond native Windows controls and centrally restrict for an entire group.

Restrict & Enforce User Logon Time
Control the hours and days when protected users can logon onto the network. Define working hours and/or maximum session time. Go beyond native Windows controls and restrict user logon hours by group and force logoff when time restrictions expire.

Monitor User Logon and Logoff
UserLock continuously monitors all login and session events, automatically blocking all inappropriate or suspicious sessions. This real-time monitoring of user activity lets you know the number of concurrent logins, who is connected from which workstation/device and since when.

Alerts & Responding to suspicious Logon Events
Receive alerts and instantly take appropriate security measures to alleviate IT security threats coming from suspicious or disruptive logon events. UserLock empowers IT teams with this response capability.

Audit Logon Events & Reporting
Report and Audit on all Windows and Active Directory access events. UserLock centralizes and archives all access events occurring on your Windows systems offering detailed insights to support IT Forensics.

Privileged user monitoring & auditing
Settings, logs and policy rules can be secured for all UserLock’s privileged users. Protect against bad or careless behavior by those who have administration rights and answer the needs for major regulatory compliance.

System Requirements

For UserLock Server
Windows 2008 Server R2 - Windows 2008 Server - Windows 2003 Server - Windows 2000 Server
For UserLock console
Windows 7 - Windows 2008 Server R2 - Windows 2008 - Windows Vista - Windows XP - Windows 2003 Server - Windows 2000 Server/Workstation
For workstations to protect
Windows 7 - Windows Vista - Windows XP - Windows 2000
For Terminal Servers to protect
Windows 2008 Server R2 - Windows 2008 Server - Windows 2008 RemoteApp - Windows 2003 Server - Windows 2000 Server Citrix Metaframe XP - Citrix Presentation Server 4 - Citrix XenApp
Name:    ISDecisions
Address:    IS Decisions Technopôle Izarbel Créaticité Bâtiment A BP 12 64210 BIDART (France)

SoftwareAsia is an Is Decisions partner. We offer first line technical support and dedicated customer service to customers who are looking to acquire Is Decisions products.

Is Decisions is a Software Vendor specializing in Infrastructure and Security Management solutions for Microsoft Windows.

SoftwareAsia sells and supports Is Decisions products in Hong Kong, Singapore, Malaysia, Philippines, India, Thailand and Indonesia.

Questions and Answers

add your question

There are no entries.

Product Tags

Use spaces to separate tags. Use single quotes (') for phrases.

Featured Brands