DeviceLock 7 review
Accidental or deliberate data leakage is now a major security headache for businesses. Dave Mitchell takes a look at DeviceLock 7 to see if it plugs those holes that others leave behind.
We created our own list of patterns and keywords and tested it by trying to send Word documents using FTP and SMTP. It worked perfectly as files that didn't have a match were allowed through and all those that did were blocked.
You can also apply auditing and shadowing policies to NetworkLock. With this activated we could see all activities from the console, view all emails being sent and see the subject line and the message content along with attachments and their contents.
ContentLock adds an extra dimension to NetworkLock - instead of a wholesale application block you could permit access but decide what files can and can't be transmitted. ContentLock also applies to removable devices so you can allow users to copy only some files to USB sticks, blocking more sensitive information.
DeviceLock can manage access to every conceivable workstation port and removable storage device.
DeviceLock 7 has an extensive range of controls for protecting business data and stopping insider theft. The optional features add considerably to the price and it's long overdue for for a centralised management console but it does cover all exits from the network and provides essential logging and auditing facilities.
DeviceLock provides some of the best controls for ensuring that sensitive data doesn’t get into the wrong hands. The new NetworkLock and ContentLock options are well worth considering as they add extra levels of security for protocols and applications but they are expensive for SMBs. We also think it’s about time DeviceLock simplified management by amalgamating all the different consoles into just one which would make it easier to use.
RAM: 64MB Hard disk space: 25MB Operating system: Windows NT or later Options: For 100-199 seats; NetworkLock £14 per seat; ContentLock £28 per seat (all ex VAT)
Humility in AI: Building trustworthy and ethical AI systems
How humble AI can help safeguard your businessDownload now
Future of video conferencing
Optimising video conferencing features to achieve business goalsDownload now
Leadership compass: Privileged Access Management
Securing privileged accounts in a high-risk environmentDownload now
Why you need to include the cloud in your disaster recovery plan
Preserving data for business successDownload now