DeviceLock DLP Suite 8.2
Stop Data Leaks at the Source
Nearly two thirds of serious data
leakage incidents are caused by employees, contractors or visitors - whether
through unintentional mistakes or by malicious intent.
With over 70,000 customers who’ve
installed DeviceLock on over 7 million computers, DeviceLock Data Loss
Prevention (DLP) software can protect your valuable data from this serious
insider threat for less than you’d probably expect.
Prevent Devastating Data Leaks by
Securing the Endpoints of Your Network
DeviceLock DLP Suite consists of five modules that protect your
organization from data leak threats:
DeviceLock provides network administrators the ability to set and
enforce contextual policies for how, when, where to, and by whom data can or
can’t be moved to or from company laptops or desktop PCs via devices like
phones, digital cameras, USB sticks, CD/DVD-R, tablets, printers or MP3
players. In addition, policies can be set and enforced for copy operations via
the Windows Clipboard, as well as screenshot operations on the endpoint
NetworkLock adds contextual-level control of user network
communications via the Internet through such means as: company email, personal
webmail, instant messaging services, social networks (like Facebook, Google+,
Twitter), web surfing, FTP file transfers, as well as cloud-based file sharing
services like Dropbox, SkyDrive and Google Drive.
ContentLock adds the capability to look inside files and other
data objects (like emails and webmails, chats, blog posts, etc.) for sensitive
information like social security numbers, credit card numbers, bank account
numbers or other user-definable information and to make block-or-allow
decisions based on policies having to do with file contents.
Discovery is a separately licensed component, which helps
network administrators and security personnel locating certain types of content
stored within and outside the limits of the corporate network. Discovering
unwanted content is essential when trying to protect the company’s intellectual
property, control employee activities and administer computer networks.
Search Server is an optional separately licensed component, which
provides full-text searching of logged data. The full-text search functionality
is especially useful in situations when you need to search for shadow copies of
documents based on their contents.
The combination of all of these
modules working together is the DeviceLock DLP Suite. The DLP Suite provides
protection against local and network data leaks at the endpoint (laptop,
desktop or server) via a wide array of threat vectors.
These include: iPhones, Androids,
BlackBerry, other smart-phones, iPods, iPads, digital cameras, Wi-Fi,
Bluetooth, FireWire, social media, IM, webmail, company email, printing, CD or
DVD ROM, USB flash drives, Compact Flash, FTP/FTPS, HTTP/HTTPS and the
Natively integrated with Microsoft
Active Directory Group Policy, the DeviceLock DLP Suite is very easy and
straight-forward to install and configure. Typical installations are handled by
Microsoft Network Administrators and do not require expensive, specially
The other great customer benefit of
DeviceLock’s tight integration with Active Directory is that it gives the solution
virtually limitless scalability. The DeviceLock DLP Suite can effortlessly run
on every endpoint listed in your Active Directory database … even if there are
tens of thousands.
DeviceLock Version 8.2 - New
Features and Enhancements
DeviceLock, Inc., a leading
developer of data leakage prevention (DLP) solutions, announced the update of
DeviceLock DLP Suite 8.2.
What's New in
DeviceLock 8.2.70986 (versus 8.2.70540):
- NetworkLock: Added new File Sharing protocol control
services: Sendspace and MediaFire.
- NetworkLock: Added new Web Mail protocol control service:
- NetworkLock: Added new Social Network protocol control
services: Instagram and Pinterest.
- NetworkLock: Enhanced Telegram control. Connections to
Telegram from the Telegram Desktop application are now controlled
separately from connections established by web browsers and other
Telegram-compatible applications. In addition to contextually
blocking/allowing connections, Telegram Desktop control supports selective
auditing of messages, incoming media calls, outgoing media calls, received
files, and sent files. For the Telegram Desktop specific control, it
supports contextual control of data shadowing as well as content analysis
for contingent shadowing selectively for incoming messages, outgoing
messages, received files, and sent files. Content analysis for detection
rules can also be controlled selectively for outgoing messages and files
sent from Telegram Desktop. Telegram Web control supports contextual blocking/allowing,
auditing, and alerting of connections established to Telegram by web
browsers and other Telegram-compatible applications.
- NetworkLock: Removed support for the AOL Instant Messenger
(aka AIM) protocol control due to the closure of their web service.
- ContentLock: Modified "Password Protected" option
trigger condition for MS Office files (.doc, .docx, .xls, .xlsx, .ppt,
.pptx) and PDF documents. Now, the "Password Protected" flag
will trigger only in the case when a document's content and/or attachments
cannot be extracted due to password protection being set on the document
or to its embedded objects.
- DeviceLock: Added new Security Settings parameters:
"Access control for USB audio devices" and "Access control
for USB cameras". By disabling these flags, you can disable access
check on USB Port level for USB-based audio devices (headphones,
microphones, etc.) and USB-based cameras respectively.
- DeviceLock: Added further improvements to the DeviceLock
Service agent's self-protection function that is activated using the
DeviceLock Administrators feature when the Enable Default Security setting
flag is unchecked.
- DeviceLock: Fixed compatibility issues with third-party
software: VirtualBox 5.2.
request a price quote or find out more about the types of licenses available, please contact us