DeviceLock 7 review
Accidental or deliberate data leakage is now a major security headache for businesses. Dave Mitchell takes a look at DeviceLock 7 to see if it plugs those holes that others leave behind.
We created our own list of patterns and keywords and tested it by trying to send Word documents using FTP and SMTP. It worked perfectly as files that didn't have a match were allowed through and all those that did were blocked.
You can also apply auditing and shadowing policies to NetworkLock. With this activated we could see all activities from the console, view all emails being sent and see the subject line and the message content along with attachments and their contents.
ContentLock adds an extra dimension to NetworkLock - instead of a wholesale application block you could permit access but decide what files can and can't be transmitted. ContentLock also applies to removable devices so you can allow users to copy only some files to USB sticks, blocking more sensitive information.
DeviceLock can manage access to every conceivable workstation port and removable storage device.
DeviceLock 7 has an extensive range of controls for protecting business data and stopping insider theft. The optional features add considerably to the price and it's long overdue for for a centralised management console but it does cover all exits from the network and provides essential logging and auditing facilities.
DeviceLock provides some of the best controls for ensuring that sensitive data doesn’t get into the wrong hands. The new NetworkLock and ContentLock options are well worth considering as they add extra levels of security for protocols and applications but they are expensive for SMBs. We also think it’s about time DeviceLock simplified management by amalgamating all the different consoles into just one which would make it easier to use.
RAM: 64MB Hard disk space: 25MB Operating system: Windows NT or later Options: For 100-199 seats; NetworkLock £14 per seat; ContentLock £28 per seat (all ex VAT)
Security analytics for your multi-cloud deployments
IBM Security QRadar SIEM solution briefDownload now
Five reasons to move to the cloud
Join the enterprises moving their workloads to the cloudDownload now
Architecting hybrid IT and edge for digital advantage
Why business leaders should consider a hybrid IT strategyDownload now
Six reasons to accelerate remote asset monitoring with AI
How to optimise resources, increase productivity, and grow profit margins with AIDownload now