Top menu

DeviceLock DLP Quick Tour

Port/Device PermissionsDeviceLock DLP controls which users can access ports (USB, FireWire, etc.), devices (removable, smartphones, etc.), printers, clipboard and redirected virtual (Terminal Services) devices.

Network Protocol PermissionsDeviceLock DLP controls which users can access network protocols and applications like HTTP(s), SMTP(s), Skype, Facebook, Dropbox and others.

Content Filtering for DevicesDeviceLock DLP analyzes and filters the textual and binary content of data copied to removable drives, storage devices, clipboard, data sent for printing, and even data hidden in screen prints, graphical files, or images in documents.

Content Filtering for NetworkDeviceLock DLP analyzes and filters the textual and binary content of data sent over the network. These include email, web access/forms/posts/searches, and applications like web mail services, social networks, cloud-based file sharing services, instant messengers, attachments, SMB file sharing, and FTP transfers.

Protocols White ListProtocols White List allows you to specify whitelist-oriented policies by IP address, address range, subnet masks, network ports and their ranges.

USB Devices DatabaseBefore the USB device can be authorized in the USB Devices White List, it must be added to the USB Devices Database.

USB Devices White ListUSB Devices White List allows you to authorize a specific device to access the USB port, while locking out all others.

Basic IP FirewallBasic IP Firewall lets you control network traffic that is not controlled by NetworkLocks list of managed protocols and is not allowed by the Protocols White List.

Audit LogDeviceLock DLP tracks user and file activity for specified device types, ports and network resources. It can pre-filter audit activities by user/group, by day/hour, by port/device/protocol type, by reads/writes, and by success/failure events.

Shadow LogDeviceLock DLP mirrors all data copied to external storage devices, printed, or transferred over the network and through serial and parallel ports. A full copy of the files can be saved into the SQL database or to a secure share.

MonitoringDeviceLock DLP monitors remote computers in real-time, checking DeviceLock Service status (running or not), policy consistency and integrity.

Administrative Alerts DeviceLock DLP can send administrative alerts to automatically notify you of critical events, requiring direct administrator actions.

Removable Media Encryption IntegrationDeviceLock DLP can recognize disks (USB-drives and other removable devices) that store data in an encrypted form, and apply so-called encrypted permissions for such disks.

DeviceLock Search ServerYou can use full-text searches to find data that you cannot find by filtering data in the log viewers. The full-text search functionality is especially useful in situations when you need to search for shadow copies of documents based on their contents.

Anti-keyloggerDeviceLock DLP detects USB keyloggers and blocks keyboards connected to them. Also, DeviceLock DLP obfuscates PS/2 keyboard input and forces PS/2 keyloggers to record garbage instead of the real keystrokes.

Reports: Relations ChartsRelations charts let you explore statistical data on a users protocol-related activities through interactive graphical visualizations of data collected into audit and shadow logs, including the deleted shadow data log.

Reports: Interactive Relations ChartsUsing Relations Charts system administrators can view relationships between users within the organization and with their external contacts.

Reports: Graphical Reports ListDeviceLock DLP automatically generates graphical reports based on audit and shadow logs.

Reports: Allowed & Denied access requests per channel This report shows the number of allowed and denied access requests per data transmission channel (devices and/or protocols).

Reports: Allowed & Denied access requests per channel This report shows the number of allowed and denied access requests per data transmission channel (devices and/or protocols).

Reports: Copied files per channelThis report shows statistics on copied files per data transmission channel (devices and/or protocols), including e-mail attachments.

Reports: Read & Write access requests per device typeThis report shows the number of read and write access requests per device type.

Reports: Top active computersThis report shows the most frequently used computers sorted according to the number of allowed and denied access requests.

Reports: Top active processesThis report shows the most active processes (applications) sorted according to the number of allowed and denied access requests sent by each process.

Reports: Top active usersThis report shows the most active users sorted according to the number of allowed and denied access requests sent by each user.

Reports: Top copied files by extension (Shadow Log)This report shows the most frequently copied file extensions sorted according to the number of copied files including e-mail attachments and total size of all copied files.

Reports: Top copied files by extension (Audit Log)This report shows groups of the most frequently copied file extensions sorted according to the number of the read and write actions.

DeviceLock Discovery: TasksAll actions (computers scanning, content checking and applying actions to discovered content) are performed by tasks.

DeviceLock Discovery: ReportsDeviceLock Discovery generates dynamic reports with comprehensive navigation structure. These reports enable you to receive detailed information about most items in the report by clicking an item. Most elements in the report are clickable links.

DeviceLock Discovery: UnitsIn DeviceLock Discovery, a unit is a basic entity for the purpose of content discovery. A unit is composed of one or more computers.

DeviceLock Discovery: Rules and ActionsBy using content detection rules, you can define the type of content to discover and specify the actions to perform on the discovered data.