DeviceLock

New product

DeviceLock Endpoint DLP Suite Carries out both contextual and content-bas

More details

DeviceLock Endpoint DLP Suite Carries out both contextual and content-based data control, ensuring the highest level of prevention of information leaks with minimal costs for the acquisition and maintenance of the complex. DeviceLock built-in mechanisms provide granular control of user access to the widest range of peripherals and data channels. Moreover, for greater reliability of data protection, in addition to contextual control, content analysis and data filtering methods can be used to exclude their transfer to external storage devices and Plug-and-Play devices, and over network protocols outside the corporate network. The software package DeviceLock Endpoint DLP Suite consists of complementary functional modules - DeviceLock, NetworkLock, ContentLock, and DeviceLock Search Server (DLSS) , Licensed optionally in any combination to meet the challenges of information security services. The basic component of DeviceLock Is an infrastructure platform and core for other components of the complex and implements all the functions of its centralized management and administration. DeviceLock supports a full set of mechanisms for contextual control of user access, and also provides event logging and shadow copying of data for all local I / O channels on protected computers, including peripherals and interfaces, the system clipboard, locally connected smartphones and PDAs, and Also a channel for printing documents to local and network printers. In addition, the DeviceLock component includes all the centralized management consoles. NetworkLock ™ Component Provides contextual control over the channels of network communications on working computers, including the recognition of network protocols regardless of the ports used, the detection of communication applications and their selective locking, the reconstruction of messages and sessions with the restoration of files, data and parameters, as well as event logging and shadow copying of transmitted data. The NetworkLock component controls the transmission of e-mail messages over open and SSL-protected SMTP sessions (with separate control of messages and attachments), web access and other HTTP / HTTPS applications, web mail, instant messengers, social networks, FTP and FTP-SSL, as well as a Telnet session. ContentLock ™ Implements mechanisms for content monitoring and filtering of files and data transferred from / to removable media and in network communication channels - web mail and social networks, instant messaging services, file exchange via FTP and FTP-SSL, etc. In addition, content technologies Filtering in the ContentLock module allows you to specify filtering for shadow copy data in order to save only those files and data that are informationally significant for information security audit tasks, investigation of abnormal situations and their forensic science Analysis. The DeviceLock Search Server component (DLSS) Provides full-text search on centralized databases of shadow copy and event logging DeviceLock. The DLSS server significantly reduces labor costs and improves the efficiency of audit processes and investigation of information security incidents involving information leaks, forensic analysis and evidence gathering. The component is licensed independently. Features:
  • Control access to devices and interfaces.
  • Monitoring of network communications.
  • Content filtering.
  • Identify unauthorized content in data warehouses.
  • Full-text search server.
  • Protection from the local administrator.
  • Centralized management.
  • Control by type of files.
  • Control of the clipboard.
  • White list of USB devices.
  • White list of media.
  • Temporary white list.
  • White list of network protocols.
  • Audit.
  • Shadow copying.
  • Alerting alerts.
  • Centralized storage of audit logs and shadow copies.
  • Prevents data from leaking through mobile devices.
  • Autonomous and operational policies.
  • Optical Character Recognition (OCR).
  • Integration with external encryption.
  • Control for virtual and terminal environments.
Advanced functions of DeviceLock® DLP Endpoint Suite:
  • Detection and blocking of hardware keyloggers. DeviceLock detects USB keyloggers and blocks the keyboards connected to them. Also DeviceLock can prevent data writing to PS / 2 keyloggers. DeviceLock distorts the data entered from the PS / 2 keyboard and forces the PS / 2 to write "garbage" instead of the actual data entered.
  • Centralized monitoring. DeviceLock Enterprise Server allows you to monitor the current state of agents on remote computers. DeviceLock Enterprise Server can periodically poll remote computers and save the current status, version and information about the settings of each agent to the monitoring log. In addition, DeviceLock Enterprise Server compares the current security policies (settings) of agents to the computers specified by the administrator with the reference policies stored in the XML file, and records information about the detected deviations in the monitoring log. It is possible to automatically replace the current security policies with reference ones.
  • Update settings on disconnected computers from the network. DeviceLock allows you to safely update agent settings on disconnected computers by creating configuration files and transferring them to users whose computers are not connected to the network and are out of the reach of the management consoles. To prevent unauthorized changes in the settings, these files can be signed using an electronic digital signature.
  • Reports. DeviceLock allows you to generate graphical reports based on data from audit and shadow logs stored on the DeviceLock Enterprise Server. These reports can be automatically sent by e-mail to the specified address. Also, DeviceLock allows you to generate reports on the settings configured on DeviceLock agents and on Plug-n-Play devices (USB, FireWire and PCMCIA) that users use on their local computers.
  • Monitoring of network bandwidth. DeviceLock can determine the balance of its network traffic, allowing you to limit the network bandwidth for audit and shadowing data going from agents to DeviceLock Enterprise Server.
  • Data compression for network transmission . DeviceLock can use streaming compression of audit and shadow copy data sent from remote agents to DeviceLock Enterprise Server to reduce the amount of information transmitted over the network and reduce the load on the network.
  • Automatic selection of the optimal server. To send audit and shadow copy data, agents can select from their lists the fastest available servers.
Featured
All options

DeviceLock 8.0

Interface languages: Russian
OS: Windows
Delivery method: Electronic delivery
System requirements
  • Agents: Windows NT / 2000 / XP / Vista / 7/8 / 8.1 / Server 2003-2012 R2 (32/64-bit); Apple OS X 10.6.8 / 10.7 / 10.8 / 10.9 (32/64-bit); Microsoft RDS, Citrix XenDesktop / XenApp, Citrix XenServer, VMware Horizon View; VMware Workstation, VMware Player, Oracle VM VirtualBox, Windows Virtual PC; CPU Pentium 4, memory 64 MB, disk 100 MB
  • Console: Windows 2000 / XP / Vista / 7/8 / 8.1 / Server 2003-2012 R2 (32/64-bit); CPU Pentium 4, 2 GB memory, 600 MB disk
  • DeviceLock Enterprise Server, DeviceLock Discovery Server, DeviceLock Search Server: Windows Server 2003-2012 (32/64-bit), Microsoft RDS, Citrix XenServer, VMware vSphere Desktop; 2xCPU Intel Xeon Quad-Core 2.33 GHz, 8 GB memory, 800 GB disk (less if you do not use SQL database); MSEE / MSDE / SQL Express or MS SQL Server
Product added to cart
Now you can checkout
Electronic version of Base
Price per copy (from 5 to 49) 2 000,00 rub.
Item added to cart
DeviceLock 8.0
Description:
Electronic version of Base
Price:
2,000 rub.
Continue shopping
Go to shopping cart
Price per copy (from 50 to 99) 1 900,00 rub.
Item added to cart
DeviceLock 8.0
Description:
Electronic version of Base
Price:
1 900 rub.
Continue shopping
Go to shopping cart
Price per copy (from 100 to 999) 1 700,00 rub.
Item added to cart
DeviceLock 8.0
Description:
Electronic version of Base
Price:
1 700 rub.
Continue shopping
Go to shopping cart
Supply: To email. Delivery in electronic form is carried out within 1-5 working days after confirmation of payment.
Product added to cart
Now you can checkout
The electronic version of Endpoint DLP Suite
Price per copy (from 1 to 49) 6 000.00 rub.
Item added to cart
DeviceLock 8.0
Description:
The electronic version of Endpoint DLP Suite
Price:
6,000 rub.
Continue shopping
Go to shopping cart
Go to shopping cart Go to shopping cart Go to shopping cart
Go to shopping cart
Go to shopping cart
Go to shopping cart
Go to shopping cart
Go to shopping cart
Go to shopping cart Go to shopping cart
Go to shopping cart
Go to shopping cart
Go to shopping cart Go to shopping cart Go to shopping cart
Go to shopping cart
Go to shopping cart
Go to shopping cart
Go to shopping cart
Go to shopping cart
Go to shopping cart Go to shopping cart
Go to shopping cart
Go to shopping cart
Go to shopping cart Go to shopping cart
Go to shopping cart