DeviceLock 9.0 Build 93212
|
Author:
Devicelock, Inc
Date: 04/19/2026 Size: 1.8 GB License: Shareware $123.00+ Requires: 11|10|8|7|Vista|XP Downloads: 41880 times Restore Missing Windows Files |
Download (ZIP)
|
MajorGeeks: Setting the standard for editor-tested, trusted, and secure downloads since 2002. |
Get free antivirus with AI-powered online scam detection Download Free!
DeviceLock Endpoint DLP Suite provides both contextual and content-based control for maximum security leakage prevention.
Its multi-layered inspection and interception engine provides fine-grained control over a full range of data leakage pathways at the context level. For further confidence that no sensitive data is escaping, content analysis and filtering can be applied to select endpoint data exchanges with removable media and PnP devices, as well as with the network.
With DeviceLock, security administrators can precisely match user rights to job functions about transferring, receiving and storing data on corporate computers. The resulting secure computing environment allows all legitimate user actions to proceed unimpeded while blocking any accidental or deliberate attempts to perform operations outside of preset bounds.
DeviceLock Features:
● Control which users or groups can access USB and FireWire ports, WiFi and Bluetooth adapters, PDAs, CD-ROMs, floppy drives, other removable devices
● Control access to devices depending on the time of day and day of the week
● Authorize only specific USB devices that will not be locked regardless of any other settings
● Grant users temporary access to USB devices when there is no network connection (you provide users with the special access codes over the phone that temporarily unlock access to requested devices)
● Uniquely identify a specific DVD/CD-ROM disk by the data signature and authorize access to it, even when DeviceLock has otherwise blocked the DVD/CD-ROM drive
● Protect against users with local administrator privileges so they can't disable DeviceLock Service or remove it from their computers if they are not in this list of DeviceLock administrators
● Set devices in read-only mode
● Protect disks from accidental or intentional formatting
● Detect and block hardware keyloggers (USB and PS/2)
● Deploy permissions and settings via Group Policy in an Active Directory domain
● Use the standard Windows RSoP snap-in to view the DeviceLock policy currently being applied, as well as to predict what policy would be applied in a given situation
● Control everything remotely using the centralized management console
● Get a complete log of port and device activity, such as uploads and downloads by users and filenames in the standard Windows Event Log that stores locally and in the specially protected log that sends to DeviceLock Enterprise Server for centralized storage
● Mirror all data (shadowing) copied to external storage devices (removable, floppy, DVD/CD-ROM) and transferred via COM and LPT ports
● Store shadow data and audit logs on a centralized component of an existing server and any existing ODBC-compliant SQL infrastructure
● Generate a report concerning the permissions and settings that have been set
● Generate a report displaying the USB, FireWire and PCMCIA devices currently connected to computers and those that were connected
● Install and uninstall it automatically
Its multi-layered inspection and interception engine provides fine-grained control over a full range of data leakage pathways at the context level. For further confidence that no sensitive data is escaping, content analysis and filtering can be applied to select endpoint data exchanges with removable media and PnP devices, as well as with the network.
With DeviceLock, security administrators can precisely match user rights to job functions about transferring, receiving and storing data on corporate computers. The resulting secure computing environment allows all legitimate user actions to proceed unimpeded while blocking any accidental or deliberate attempts to perform operations outside of preset bounds.
DeviceLock Features:
● Control which users or groups can access USB and FireWire ports, WiFi and Bluetooth adapters, PDAs, CD-ROMs, floppy drives, other removable devices
● Control access to devices depending on the time of day and day of the week
● Authorize only specific USB devices that will not be locked regardless of any other settings
● Grant users temporary access to USB devices when there is no network connection (you provide users with the special access codes over the phone that temporarily unlock access to requested devices)
● Uniquely identify a specific DVD/CD-ROM disk by the data signature and authorize access to it, even when DeviceLock has otherwise blocked the DVD/CD-ROM drive
● Protect against users with local administrator privileges so they can't disable DeviceLock Service or remove it from their computers if they are not in this list of DeviceLock administrators
● Set devices in read-only mode
● Protect disks from accidental or intentional formatting
● Detect and block hardware keyloggers (USB and PS/2)
● Deploy permissions and settings via Group Policy in an Active Directory domain
● Use the standard Windows RSoP snap-in to view the DeviceLock policy currently being applied, as well as to predict what policy would be applied in a given situation
● Control everything remotely using the centralized management console
● Get a complete log of port and device activity, such as uploads and downloads by users and filenames in the standard Windows Event Log that stores locally and in the specially protected log that sends to DeviceLock Enterprise Server for centralized storage
● Mirror all data (shadowing) copied to external storage devices (removable, floppy, DVD/CD-ROM) and transferred via COM and LPT ports
● Store shadow data and audit logs on a centralized component of an existing server and any existing ODBC-compliant SQL infrastructure
● Generate a report concerning the permissions and settings that have been set
● Generate a report displaying the USB, FireWire and PCMCIA devices currently connected to computers and those that were connected
● Install and uninstall it automatically
Version History for DeviceLock:
https://dl.managed-protection.com/u/devicelock/rn/9.0.up4/en-US/DeviceLock_DLP_relnotes.htm
Limitations:
30-day Trial
Screenshot for DeviceLock





Tactical Briefings