Data Loss Prevention News


DeviceLock« 6.2 just released!

SmartLine Inc Releases Encryption-Integrated DeviceLock« 6.2

What's New in DeviceLock« 6.2 (versus 6.1.1):

  • Added granular access control, auditing and shadowing for Windows Mobile devices. Now you can set permissions for different objects (files, contacts, e-mails, etc.) transferring from/to PDAs running Windows Mobile OS. Also, you can enable auditing and shadowing for files and other objects (contacts, e-mails, etc.) copying from the PCs to PDAs. All connection interfaces (USB, COM, IrDA, Bluetooth, WiFi) are supported.

  • Added integration with PGP Whole Disk Encryption. DeviceLock« now can detect encrypted PGP disks (USB Flash Drives and other removable media) and apply special "encrypted" permissions to them. Using these "encrypted" permissions you can, for example, allow writing only to the encrypted removable devices and deny writing to the unencrypted media.

  • Added integration with Lexar SAFE PSD encrypted flash drives. DeviceLock« detects Lexar SAFE PSD drives and applies special "encrypted" permissions to them.

  • Now DeviceLock« can prevent PS/2 keyloggers from recording keystrokes. DeviceLock« obfuscates PS/2 keyboard's input and forces PS/2 keyloggers to record some garbage instead of the real keystrokes.

  • Now white-listed USB devices which have access control on both interface (port) and type levels can be allowed to bypass control on the type level. For example, by disabling the "Control as Type" flag for a USB flash drive that has been added to the USB Devices White List, you can bypass security checking on the Removable level. Also, this "Control as Type" flag is always disabled for devices authorized via a Temporary White List. This new feature allows you to avoid permissions conflicts (double control) for white-listed devices and simplifies defining access control policies.

  • Changed parameters for the silent setup. Now all DeviceLock« Service settings, permissions, audit and shadowing rules can be defined in the external XML file and applied during the silent setup. To load an external XML file during the silent setup, specify the "SettingsFile" parameter.

  • Added stream compression for audit logs and shadow data sending from DeviceLock« Services to DeviceLock« Enterprise Server. By enabling stream compression you can decrease the size of data transfers and thus reduce the network load.

  • In DeviceLock« Enterprise Manager, a new Set Service Settings plug-in is added, replacing the former Set Permissions/Auditing plug-in. Using this Set Service Settings plug-in you can apply DeviceLock« Service parameters (including permissions, audit and shadowing rules, settings, etc.) to remote computers.

  • Added a DeviceLock« Service Settings Editor which allows you to create and modify all DeviceLock« Service parameters (including permissions, audit and shadowing rules, settings, etc.) in an external file. Later this file can be loaded into DeviceLock« Management Console and DeviceLock« Group Policy Manager, used in the Set Service Settings plug-in of DeviceLock« Enterprise Manager or signed using the DeviceLock« Signing Tool. The DeviceLock« Service Settings Editor is a snap-in for MMC and has the same interface as DeviceLock« Management Console and DeviceLock« Group Policy Manager.

  • Changed the interface of Permissions and Audit & Shadowing dialogs. Now these dialogs support new permissions and audit and shadowing rules for Windows Mobile devices, encrypted PGP and Lexar SAFE PSD disks.

  • In DeviceLock« Management Console's audit and shadowing logs viewers, parameters in the filter dialogs can now be saved/loaded to/from the external files.

Existing customers that are still within their one-year free maintenance period can use this new version without any fee!

Other customers can also receive an upgrade but for the additional fee. If you want to purchase an upgrade, please e-mail us at upgrade (at) (Please delete the space before and after the "(at)" letters and also replace "(at)" with @ mark. We are sorry for this inconvenience, but these steps are necessary to help us avoid SPAM.)


News archive