Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Auth0 Reviews & Ratings
    860 Ratings
    Company Website
  • Cisco Duo Reviews & Ratings
    1,313 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    177 Ratings
    Company Website
  • UTunnel VPN and ZTNA Reviews & Ratings
    119 Ratings
    Company Website
  • FusionAuth Reviews & Ratings
    119 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,122 Ratings
    Company Website
  • Syncro Reviews & Ratings
    408 Ratings
    Company Website
  • Rippling Reviews & Ratings
    12,711 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    464 Ratings
    Company Website
  • ManageEngine ADSelfService Plus Reviews & Ratings
    108 Ratings
    Company Website

What is UserLock?

UserLock | Access Control and Two-Factor Authentication Solutions for Windows Active Directory Systems.

What is NTFS Permissions Reporter?

Acquire our intuitive NTFS permissions analysis tool for seamless evaluation and documentation of NTFS security! Create comprehensive reports that showcase NTFS permissions in a structured Excel spreadsheet or an HTML format. Provide essential NTFS permissions insights directly to the data owner for better management. Retrieve user-specific effective NTFS permissions for any folder or share, including its complete hierarchy. With the Company Edition or Enterprise Edition, you have the option to save any Permissions Report in a built-in local database or an external Microsoft SQL Server, enabling you to revisit historical data and monitor changes over time. Ensure your NTFS Permissions Report remains clear by excluding any Active Directory security groups from your analysis. There’s no need to include names of recognized accounts, such as backup operators or share operators, which streamlines the report. Furthermore, if unique Access Control Entries (ACEs) are present on folders, you can translate these security settings into user-friendly labels for improved understanding. This approach guarantees that your reports are both precise and easy to grasp, enhancing the overall usability of the information provided. By simplifying the complexities of NTFS permissions, you empower users to make informed decisions about their data security.

Media

Media

Integrations Supported

Additional information not provided

Integrations Supported

Additional information not provided

API Availability

Has API

API Availability

Has API

Pricing Information

$2.00/month/user
Free Trial Offered?
Free Version

Pricing Information

€997 per year
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

IS Decisions

Date Founded

2001

Company Location

France

Company Website

www.isdecisions.com

Company Facts

Organization Name

G-TAC Software

Company Location

India

Company Website

www.foldersecurityviewer.com

Categories and Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Categories and Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Popular Alternatives

Popular Alternatives

Specops Password Auditor Reviews & Ratings

Specops Password Auditor

Specops Software
GFI LanGuard Reviews & Ratings

GFI LanGuard

GFI Software