DeviceLock Endpoint DLP Suite - Comprehensive Features List
Devices Access Control. Administrators can control which users or groups can access USB, FireWire, Infrared, COM and LPT ports; WiFi and Bluetooth adapters; any type of printer, including local, network and virtual printers; Windows Mobile, BlackBerry, MTP-enabled devices (such as Android, Windows Phone, etc.), iPhone and Palm OS-based PDAs and smartphones; Terminal Services devices; as well as DVD/BD/CD-ROMs, floppy drives, and other removable and Plug-and-Play devices. It's possible to set devices in read-only mode and control access to them depending on the time of day and day of the week.
Network Communications Control. The NetworkLock module adds comprehensive contextual control over Windows endpoint network communications including network protocols, web applications and listed Instant Messenger applications like Skype. Regular and SSL-tunneled email communications (SMTP, Exchange-MAPI and listed webmail services) are controlled with messages and file attachments handled and filtered separately. NetworkLock also controls web access and other HTTP-based applications with the ability to extract the content from encrypted HTTPS sessions. Web applications, social networks, cloud-based file sharing web access and webmail services are secured separately from the HTTP control for easier configuration, while supported sites, email addresses and sender/recipient IDs can be whitelisted for approved users within NetworkLock. See the Product Specifications section for a list of supported webmail services, social networks, cloud-based file sharing services and instant messengers controlled by NetworkLock.
Content Filtering. Extending DeviceLock and NetworkLock capabilities beyond contextual security, the ContentLock module can analyze and filter the textual and binary content of data copied to removable media drives, to other Plug-nPlay storage devices, to the clipboard, data sent for printing, and even data hidden in screen prints, graphical files, or images in documents. ContentLock also filters data objects and sessions within network communications. These include email, web access/forms/posts, and applications like web mail services, social networks, cloud-based file sharing services, instant messengers, attachments, SMB file sharing, and FTP transfers. The content analysis engine can extract textual data from 150+ file formats and data types, and then apply effective and reliable content filtering methods. Content detection of structured data is based on pre-built templates of Regular Expression (RegExp) patterns and industry-specific keyword filters (HIPAA, PCI, etc.), while data fingerprinting is used to detect unstructured textual and binary content. Digital fingerprints are categorized to their respective Data Classifications with certain levels of importance or secrecy (e.g. “Restricted”, “Confidential”, “Secret”, “Top Secret”, etc.). In addition, ContentLock can recognize and use for content filtering classification labels assigned to documents and files by Boldon James Classifier products. Document meta properties and verified file types can also be content analysis factors. Content detection templates can be modified with numerical threshold conditions and/or combined with Boolean logic operators (AND/OR/NOT) for unmatched flexibility of control.
Host-Resident OCR. Complementing content filtering of textual-based data objects, a built-in optical character recognition (OCR) engine allows DeviceLock DLP to quickly, efficiently and accurately extract and inspect textual data from pictures in documents and graphical files of many image formats. With 30+ languages recognized, this highly efficient OCR engine uses regular expressions, keyword dictionaries, and other advanced methods to improve recognition and deliver the ability to discover and protect exposed confidential data in information assets presented in graphical form. Unique to DeviceLock DLP is that the OCR module runs in each of its enforcement oriented components: DeviceLock Agent, DeviceLock Discovery Server and DeviceLock Discovery Agent. This distributed OCR architecture tremendously improves the overall performance of the solution, because the graphical objects stored on endpoints can be scanned and inspected by local host-resident OCR modules, which in turn significantly decreases the load to the Discovery Server, as well as reducing the “scan” traffic on the corporate network.
Content Discovery. DeviceLock Discovery enables organizations to gain visibility and control over confidential “data-at-rest” stored across their IT environment in order to proactively prevent data breaches and achieve compliance with regulatory and corporate data security requirements. By automatically scanning data residing on network shares, storage systems and Windows endpoint computers inside and outside of the corporate network, DeviceLock Discovery locates documents with sensitive content and provides options to remediate them, as well as initiate incident management procedures with real-time alerts to SIEM systems and data security personnel. By using the full set of ContentLock features that now include OCR capabilities, DeviceLock can discover textual data in more than 100 file formats and 40 types of nested archives, as well as within pictures in documents and graphical files. Depending on the network topology and specifications, DeviceLock Discovery can perform scans in agentless, agent-based and mixed scanning modes. The scans can be initiated manually or configured to run on a schedule while targeting corporate computers, network shares and storage systems in the organization. DeviceLock Discovery Agents can be remotely installed on and removed from target computers by DeviceLock Discovery Server in a fully automatic and transparent manner. When used together with other DeviceLock DLP components, DeviceLock Discovery can also utilize the built-in discovery capabilities of DeviceLock Agents for scanning data stored on their host computers and accessible network shares.
Tamper Protection. The configurable 'DeviceLock Administrators' feature prevents tampering with DeviceLock policy settings locally on Windows and Apple OS even by users with local system administration privileges. With this feature activated, only designated DeviceLock administrators working from a DeviceLock console or Group Policy Object (GPO) Editor can uninstall upgrade the agent or modify DeviceLock policies in any way.
Active Directory Group Policy Integration. DeviceLock’s primary console integrates directly with the Microsoft Management Console (MMC) Active Directory (AD) Group Policy interface. As Group Policy and MMC-style interfaces are completely familiar to AD administrators, there is no proprietary interface to learn or training classes needed to effectively manage endpoint DLP policies centrally. The mere presence of the DeviceLock MMC snap-in console on a Group Policy administrator’s computer allows for direct integration into the Group Policy Management Console (GPMC) or the Active Directory Users & Computers (ADUC) console without any scripts, ADM templates, or schema changes whatsoever. Administrators can dynamically manage both Windows and Apple OS endpoint settings right along with their other Group Policy–automated tasks. Absent a Group Policy environment, DeviceLock also has classic Windows consoles and a web browser console that can centrally manage agents on any Novell, LDAP, or 'workgroup' IP network of Windows computers. XML-based policy templates can be shared across all DeviceLock consoles.
Centralized Configuration and Deployment. The DeviceLock Enterprise Server (DLES) module can deploy security policies to DeviceLock Service agents across the organization’s network as an alternative to manually via DeviceLock administrative consoles and/or automatically via Active Directory GPOs. Feature is meant for workgroups or non-AD LDAP environments. DeviceLock supports two ways to deliver policy template files from the DLES to agents: "push" (server pushes policy by DL administrator’s request) and "pull" (DeviceLock agent can be configured to query for policy by itself on a schedule or the endpoint user can make ad hoc requests of the DLES for updated policy).
True File Type Control. Administrators can selectively grant or deny access to over 5,300 specific file types for removable media. When a file type policy is configured, DeviceLock will look into a file’s binary content to determine its true type (regardless of file name and extension) and enforce control and shadowing actions per the applied policy. For flexibility, Content-Aware Rules for file types can be defined on a per-user or per-group basis at the device/protocol type layer. True file type rules can also apply to pre-filtering of shadow copies to reduce the volume of captured data.
Clipboard Control. DeviceLock enables administrators to effectively block data leaks at their earliest stage—when users deliberately or accidentally transfer unauthorized data between different applications and documents on their local computer through the Windows clipboard and print-screen mechanisms. DeviceLock can selectively control user/group access to objects of different data types that are copied into the clipboard. These types include files, textual data, images, audio fragments (i.e. captured with Windows Sound Recorder), and even data of "unidentified" types. In addition, content of textual data copied via the clipboard can be monitored and filtered. DeviceLock DLP separately, independently and uniquely protects and filters clipboard operations when redirected to a remote BYOD device in a terminal session to provide Virtual DLP. To prevent one of the oldest methods of data theft, screenshot operations can be blocked for specific users/groups. These include the Windows PrintScreen keyboard function, and the screen capture features of third-party applications. If screenshots are allowed contextually by policy, ContentLock’s advanced OCR content inspection can filter the textual content of captured screen images according to DLP policies.
USB White List. Allows you to authorize a specific model of device to access the USB port, while locking out all others. You can even "White List" a single, unique device, while locking out all other devices of the same brand and model, as long as the device manufacturer has supplied a suitable unique identifier, such as a serial number.
Media White List. Allows you to authorize access to specific DVD/BD/CD-ROM disks, uniquely identified by data signature, even when DeviceLock has otherwise blocked the DVD/BD/CD-ROM drive. A convenience when DVD/BD/CD-ROM disks are routinely used for the distribution of new software or instruction manuals, Media White Listing can also specify allowed users and groups, so that only authorized users are able to access the contents of the DVD, Blu-ray or CD-ROM.
Temporary White List. Allows granting temporary access to a USB-connected device by the issuing of an access code, rather than through regular DeviceLock permission setting/editing procedures. Useful when permissions need to be granted and the system administrator has no network connection; for example, in the exceptional case of accommodating a sales manager who calls in with a request for USB access when working outside the company's network.
Protocols White List. Allows you to specify whitelist-oriented policies by IP address, address range, subnet masks, network ports and their ranges.
Auditing. DeviceLock‘s auditing capability tracks user and file activity for specified device types, ports and network resources on a local computer. It can pre-filter audit activities by user/group, by day/hour, by port/device/protocol type, by reads/writes, and by success/failure events. DeviceLock employs the standard event logging subsystem and writes audit records to a Windows Event Viewer log with GMT timestamps. Logs can be exported to many standard file formats for import into other reporting mechanisms or products. Also, audit records can be automatically collected from remote computers and centrally stored in SQL Server. Even users with local admin privileges can't edit, delete or otherwise tamper with audit logs set to transfer to DeviceLock Enterprise Server.
Shadowing. DeviceLock’s data shadowing function can be set up to mirror all data copied to external storage devices, printed, or transferred over the network and through serial and parallel ports. DeviceLock can also split ISO images produced by CD/DVD/BD burners into the original separated files upon auto-collection by the DeviceLock Enterprise Server (DLES). A full copy of the files can be saved into the SQL database or to a secure share managed by the DLES. Shadowing activities can be pre-filtered just like regular auditing to narrow down what is collected. DeviceLock’s audit and shadowing features are designed for efficient use of transmission and storage resources with stream compression, traffic shaping for quality of service (QoS), performance/quota settings, and automated optimal DLES server selection. ContentLock’s content filtering technology makes DeviceLock’s data shadowing feature even more efficient, scalable and intelligent. Content-based data shadowing is supported for all endpoint data channels including removable and plug-and-play storage devices, network communications, local synchronizations with supported smartphones and document printing. Incoming and/or outgoing transmissions can be conditionally shadowed. By pre-filtering the content of potentially large data objects before shadowing to the log, DeviceLock downsizes the streams to just those objects that contain information meaningful for post-analysis tasks like security compliance auditing, incident investigations, and cyber-forensics.
Alerting. DeviceLock provides SNMP, SYSLOG and SMTP based alerting capabilities driven by DeviceLock DLP endpoint events for real time notification of sensitive user activities on protected endpoints on the network.
Mobile Device Local Sync Control. Administrators can use DeviceLock's patented Local Sync control technology to set granular access control, auditing, and shadowing rules for data that Microsoft Windows Mobile®, Apple iPhone®/iPad®/iPod touch® or Palm® mobile devices exchange through local synchronizations with Windows endpoints. Permissions are uniquely granular and define which "types" of mobile device data (files, pictures, emails, contacts, calendars, etc.) that specified users/groups are allowed to synchronize between managed endpoints and personal mobile devices regardless of the connection interface. Presence detection, access control and event logging for Android®, Windows Phone and other MTP devices, as well as BlackBerry® smartphones are specifically supported at the device type level.
Printing Security. DeviceLock puts local and network printing from Windows endpoints under the strict control of administrators. By intercepting Print Spooler operations, DeviceLock enables administrators to centrally control user access and content of printed documents sent to local, network, and even virtual printers from DeviceLock-protected endpoints. In addition, for USB-connected printers, specified printer vendor models and/or unique printer device IDs can be allowed for designated users and groups. Printing events can be logged and the actual print job data can be shadow-copied in searchable PDF format, collected, and stored centrally for audit and post-analysis.
Network-Awareness. Administrators can define different online vs. offline security policies for the same user account. A reasonable and often necessary setting on a mobile user’s laptop, for example, is to disable WiFi when docked to the corporate network and enable it when undocked.
Removable Media Encryption Integration. DeviceLock takes an open integration approach to encryption of data uploaded to removable media. Customers have the option of using the encryption solution that best fits their security scenarios among best-of-breed technologies that include: Windows BitLocker To Go™, Apple OS X FileVault, PGP® Whole Disk Encryption for standard FIPS-certified encryption; TrueCrypt® for free Open Source encryption; SafeDisk®, SecurStar® DriveCrypt Plus Pack Enterprise (DCPPE) software; and Lexar Media’s S1100/S3000 series USB flash drives for pre-encrypted removable media. In addition, any pre-encrypted USB media can be selectively whitelisted with usage strictly enforced. DeviceLock allows for discrete access rules for both encrypted and unencrypted partitions of such media.
Search Server. DeviceLock Search Server provides full-text searching of logged data stored on DeviceLock Enterprise Server. You can use full-text searches to find data that you cannot find by filtering data in the log viewers. The full-text search functionality is especially useful in situations when you need to search for shadow copies of documents based on their contents. DeviceLock Search Server can automatically recognize, index, search and display documents in many formats, such as: Adobe Acrobat (PDF), Ami Pro, Archives (GZIP, RAR, ZIP), Lotus 1-2-3, Microsoft Access, Microsoft Excel, Microsoft PowerPoint, Microsoft Word, Microsoft Works, OpenOffice (documents, spreadsheets and presentations), Quattro Pro, WordPerfect, WordStar and many others. DeviceLock Search Server can run searches by schedule and send search results via emai.
Virtual DLP for BYOD Devices. DeviceLock's Virtual DLP features provide the ability to protect any BYOD device against insider data leaks when using leading desktop and application virtualization solutions like Citrix XenApp/XenDesktop, Microsoft RDS and VMware Horizon View. Running on a VDI Host or Terminal Server, DeviceLock "remotes" contextual and content-aware endpoint DLP controls to the connected remote BYOD device to create a virtual endpoint DLP agent that prevents uncontrolled data exchanges to local peripherals, hosted applications and network connections of the BYOD device while "in session". This approach unifies DeviceLock DLP across physical and virtual Windows and BYOD environments.
Extended DeviceLock® Functions
Anti-keylogger. DeviceLock detects USB keyloggers and blocks keyboards connected to them. Also, DeviceLock obfuscates PS/2 keyboard input and forces PS/2 keyloggers to record garbage instead of the real keystrokes.
Monitoring. DeviceLock Enterprise Server can monitor remote computers in real-time, checking DeviceLock Service status (running or not), policy consistency and integrity. The detailed information is written to the Monitoring log. Also, it is possible to define a master policy that can be automatically applied across selected remote computers in the event that their current policies are suspected to be out-of-date or damaged.
RSoP Support. You can use the Windows standard Resultant Set of Policy snap-in to view the DeviceLock policy currently being applied, as well as to predict what policy would be applied in a given situation.
Batch Processing. Allows you to define settings for a class of similar computers with similar devices (e.g. all computers have USB ports and CD-ROMs) across a large network in a fast and consistent manner. DeviceLock Service can be automatically installed or updated on all the computers in a network using DeviceLock Enterprise Manager.
Graphical Reporting. DeviceLock can automatically generate graphical reports based on audit and shadow logs.
Permissions Report. Allows you to generate a report displaying the permissions and audit rules that have been set on all the computers across the network.
Report Plug-n-Play Devices. Allows you to generate a report displaying the USB, FireWire and PCMCIA devices currently connected to computers in the network and those that were historically connected.
Traffic Shaping. DeviceLock allows you to define bandwidth limits for sending audit and shadow logs from DeviceLock Service to DeviceLock Enterprise Server. This Quality of Service (QoS) feature helps reduce the network load.
Stream Compression. You can instruct DeviceLock to compress audit logs and shadow data pulled from endpoints by DeviceLock Enterprise Server service. Doing this decreases the size of data transfers and thus reduces the network load.
Optimal Server Selection. For optimal transfer of audit and shadow logs, DeviceLock Services can automatically choose the fastest available DeviceLock Enterprise Server from a list of available servers.