Menu
Your Cart

DeviceLock

DeviceLock
Hot

Need more information on this product?

Please contact us on +44 (0)20 8733 7100 or via our online form.

Contact Us

If you are not currently a customer, you can apply for an account.

Register here


  • SKU: DEVICELOCK


Policy-based endpoint data leak prevention (DLP) security that enables network administrators to gain central control of uploading and downloading activity through local computer devices.

DeviceLock provides network administrators the ability to set and enforce contextual policies for how, when, where to and by whom data can or cant be moved to or from company laptops or desktop PCs via devices like phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3 players. In addition, policies can be set and enforced for copy operations via the Windows Clipboard, as well as screenshot operations on the endpoint computer.

DeviceLock DLP Suite consists of DeviceLock and other 4 modules that protect your organisation from data leak threats:

  • NetworkLock adds contextual-level control of user network communications via the Internet through such means as: company email, personal webmail, instant messaging services, social networks (like Facebook, Google+, Twitter), web surfing, FTP file transfers, as well as cloud-based file sharing services like Dropbox, SkyDrive and Google Drive.
  • ContentLock adds the capability to look inside files and other data objects (like emails and webmails, chats, blog posts, etc.) for sensitive information like social security numbers, credit card numbers, bank account numbers or other user-definable information and to make block-or-allow decisions based on policies having to do with file contents.
  • Discovery is a separately licensed component, which helps network administrators and security personnel locating certain types of content stored within and outside the limits of the corporate network. Discovering unwanted content is essential when trying to protect the companys intellectual property, control employee activities and administer computer networks.
  • Search Server is an optional separately licensed component, which provides full-text searching of logged data. The full-text search functionality is especially useful in situations when you need to search for shadow copies of documents based on their contents.

DeviceLock - Features

Key Features:

  • Device Access Control: Control who can access USB, FireWire, Infrared, COM and LPT ports.
  • Network Communications Control: NetworkLock's detection technology is port-independent and recognises network applications types and protocols where data leakage can occur.
  • Content Filtering: ContentLock supports content filtering for data objects copied to removable drives, other Plug-n-Play storage devices, sent to printers and through network communications secured by the NetworkLock module on the endpoint.
  • Host-Resident OCR: The built-in optical character recognition engine allows DeviceLock DLP to quickly, efficiently and accurately extract and inspect textual data from pictures in documents and graphical files of many image formats.
  • Tamper Protection: Configurable DeviceLock Administrators feature prevents anyone from tampering with DeviceLock settings locally.
  • AD Integration: Integrates directly with the Microsoft Management Console (MMC) Active Directory (AD) Group Policy platform.
  • True File Type Control: Selectively grant or deny access to over 4,000 specific file types for removable media.
  • Clipboard Control: Block data leaks at their very embryonic stage.
  • USB White List: Allows users to authorise a specific model of device to access the USB port, while locking out all others.
  • Media White List: Allows users to authorise access to specific DVD/BD/CD-ROM disks, uniquely identified by data signature, even when DeviceLock has otherwise blocked the DVD/BD/CD-ROM drive.
  • Temporary White List: Allows granting temporary access to a USB-connected device by the issuing of an access code.
  • Protocols White List: Allows users to specify whitelist-oriented policies by IP address, address range, subnet masks, network ports and their ranges.
  • Auditing: Tracks user and file activity for specified device types, ports and network resources on a local computer.
  • Shadowing: The function can be set up to mirror all data copied to external storage devices, printed, or transferred over the network and through serial and parallel ports
  • Alerting: Provides both SNMP and SMTP based alerting capabilities driven by DeviceLock DLP endpoint events for real time notification of sensitive user activities on protected endpoints on the network.
  • Mobile Device Data Leakage Prevention: Set granular access control, auditing and shadowing rules for mobile devices that use Windows Mobile, iOS or Palm OS.
  • Network-Awareness: Define different online vs. offline security policies for the same user account.
  • Removable Media Encryption Integration: DeviceLock takes an open integration approach to encryption of data uploaded to removable media. Search Server: Provides full-text searching of logged data stored on DeviceLock Enterprise Server.
  • Virtual DLP for BYOD Devices: Provide the ability to protect any BYOD device against insider data leaks when using leading desktop and application virtualisation solutions.

DeviceLock - System Requirements

  • Agents: Windows NT/2000/XP/Vista/7/8/8.1/10/Server 2003-2012 R2 (32/64-bit); Apple OS X 10.6.8/10.7/10.8/10.9/10.10/10.11 (32/64-bit); Microsoft RDS, Citrix XenDesktop/XenApp, Citrix XenServer, VMware Horizon View; VMware Workstation, VMware Player, Oracle VM VirtualBox, Windows Virtual PC; CPU Pentium 4, 512MB RAM, HDD 400MB
  • Consoles: Windows 2000/XP/Vista/7/8/8.1/10/Server 2003-2012 R2 (32/64-bit); CPU Pentium 4, 512MB RAM, HDD 1GB
  • DeviceLock Enterprise Server, DeviceLock Discovery Server, DeviceLock Search Server: Windows Server 2003-2012 R2 (32/64-bit), Microsoft RDS, Citrix XenServer, VMware vSphere Desktop; 2xCPU Intel Xeon Quad-Core 2.33GHz, RAM 8GB, HDD 800GB (if hosting SQL DB, less if not); MSEE/MSDE/SQL Server Express or MS SQL Server.
Tags: devicelock , system , tools