Take UserLock® Screenshots Tour

UserLock® functionality
UserLock significantly reinforces Windows infrastructures security by giving network administrators the ability to:
- implement and enforce efficient restriction and access policies for Windows 2000/XP/2003/Vista/2008/Seven networks (LAN and WAN)
- be alerted when specific events occur (accepted logins, denied logins…) by user or user group
- remotely log off or lock a user session
- monitor in real time all connectivity on the network
- automatically log activity and generate precise session reports and statistics
- …
You will be able to:
- limit the amount of simultaneous sessions (same ID, same password) per user or per user group
- limit user access to the network per computer or computer range (department, room, floor, building…)
- enforce logon time restrictions on a group-by-group basis
- know at any time what user(s) is/are connected, from what workstation(s), since when…
How does UserLock® work?
UserLock is very simple to use and doesn’t require any prior training.
Only a few minutes are necessary to get UserLock running and securing access to your network:
- Install UserLock on a Windows server (needn’t be the domain controller) and select the zone you wish to protect (all trusted domains, one domain or an organizational unit) using the setup assistant.
- Deploy the UserLock ‘agent’ (100 KB dll) to a selection of workstations from the administration console.
- Define for each user or user group the total amount of simultaneous sessions allowed.
- Define for each user or user group the workstation(s) from which they can login.
- Define logon time restrictions on a group-by-group basis
Why buy UserLock®?
Using UserLock in your environment will bring you the following advantages:
- help toward your information systems compliance as to multiple international regulations and standards (HIPAA, Sarbane-Oxley, GLBA, NIST/FIPS, ITIL, COBIT, CISP, ISO 17799…)
- Significantly reinforce your Information System’s Security by:
- eradicating hazardous user practices such as:
- Reading unintended emails
- Sending emails under a usurped identity
- Accessing unauthorized files
- Using passwords stored in Windows
- Concealing any malpractices behind false ID
- … - monitoring in real time all session activity and knowing at all times who is connected, from where and since when…
- setting popup or email alerts for specific events per user or group (denied logons, successful logons, logoffs…).
- eradicating hazardous user practices such as:
- optimizing your network’s usage (public or shared workstations in open spaces, classrooms, departments…) by:
- Stopping users from logging on to several workstations simultaneously
- Remotely controlling all sessions (lock, logoff, reset…)
- Monitoring workstation occupation rate