DeviceLock Endpoint DLP Suite provides both contextual and content-based control for maximum security leakage prevention.
Its multi-layered inspection and interception engine provides fine-grained control over a full range of data leakage pathways at the context level. For further confidence that no sensitive data is escaping, content analysis and filtering can be applied to select endpoint data exchanges with removable media and PnP devices, as well as with the network.
With DeviceLock, security administrators can precisely match user rights to job functions about transferring, receiving and storing data on corporate computers. The resulting secure computing environment allows all legitimate user actions to proceed unimpeded while blocking any accidental or deliberate attempts to perform operations outside of preset bounds.
Control which users or groups can access USB and FireWire ports, WiFi and Bluetooth adapters, PDAs, CD-ROMs, floppy drives, other removable devices
Control access to devices depending on the time of day and day of the week
Authorize only specific USB devices that will not be locked regardless of any other settings
Grant users temporary access to USB devices when there is no network connection (you provide users with the special access codes over the phone that temporarily unlock access to requested devices)
Uniquely identify a specific DVD/CD-ROM disk by the data signature and authorize access to it, even when DeviceLock has otherwise blocked the DVD/CD-ROM drive
Protect against users with local administrator privileges so they can't disable DeviceLock Service or remove it from their computers if they are not in this list of DeviceLock administrators
Set devices in read-only mode
Protect disks from accidental or intentional formatting
Detect and block hardware keyloggers (USB and PS/2)
Deploy permissions and settings via Group Policy in an Active Directory domain
Use the standard Windows RSoP snap-in to view the DeviceLock policy currently being applied, as well as to predict what policy would be applied in a given situation
Control everything remotely using the centralized management console
Get a complete log of port and device activity, such as uploads and downloads by users and filenames in the standard Windows Event Log that stores locally and in the specially protected log that sends to DeviceLock Enterprise Server for centralized storage
Mirror all data (shadowing) copied to external storage devices (removable, floppy, DVD/CD-ROM) and transferred via COM and LPT ports
Store shadow data and audit logs on a centralized component of an existing server and any existing ODBC-compliant SQL infrastructure
Generate a report concerning the permissions and settings that have been set
Generate a report displaying the USB, FireWire and PCMCIA devices currently connected to computers and those that were connected