Top menu

Quick Tour

Port/Device PermissionsAdministrators have full central control over access, audit, shadow, and content rules covering potential local data leakage channels across the entire Active Directory domain forest.

Network Protocol PermissionsAdministrators can set user permissions for the network communications used for web mail, SMTP mail, social networking applications, instant messaging, file transfers, telnet sessions and more.

Content FilteringSupports content filtering for data objects copied to removable drives, other Plug-n-Play storage devices, sent to printers, and through network communications on the endpoint.

Content FilteringSupports content filtering for data objects copied to removable drives, other Plug-n-Play storage devices, sent to printers, and through network communications on the endpoint.

Protocols White ListAllows you to specify whitelist-oriented policies by IP address, address range, subnet masks, network ports and their ranges.

USB White ListAllows you to authorize a specific model of device to access the USB port, while locking out all others.

USB White ListAllows you to authorize a specific model of device to access the USB port, while locking out all others.

Basic IP FirewallBlocks TCP and UDP connections that are not otherwise supported by NetworkLock's list of managed Protocols.

AuditingAuditing capability tracks user and file activity for specified device types, ports and network resources on a local computer.

ShadowingData shadowing function can be set up to mirror all data copied to external storage devices, printed, or transferred over the network and through serial and parallel ports.

MonitoringMonitors remote computers in real-time, checking DeviceLock Service status (running or not), policy consistency and integrity.

AlertingProvides both SNMP and SMTP based alerting capabilities driven by DeviceLock DLP endpoint events for real time notification of sensitive user activities on protected endpoints.

Removable Media Encryption Integration Takes an open integration approach to encryption of data uploaded to removable media.

Search ServerProvides full-text searching of logged audit and shadow data.

Anti-keyloggerDetects USB keyloggers and blocks keyboards connected to them.

Graphical ReportingAutomatically generates graphical reports based on audit and shadow logs.

Graphical Reporting
Automatically generates graphical reports based on audit and shadow logs.

Graphical Reporting Automatically generates graphical reports based on audit and shadow logs.

Graphical ReportingAutomatically generates graphical reports based on audit and shadow logs.

Graphical ReportingAutomatically generates graphical reports based on audit and shadow logs.

Graphical ReportingAutomatically generates graphical reports based on audit and shadow logs.

Graphical ReportingAutomatically generates graphical reports based on audit and shadow logs.

Graphical ReportingAutomatically generates graphical reports based on audit and shadow logs.

Graphical ReportingAutomatically generates graphical reports based on audit and shadow logs.

Graphical ReportingAutomatically generates graphical reports based on audit and shadow logs.

Data DiscoveryLocates documents with exposed sensitive content and provides options to protect them with remediation actions.

Data DiscoveryLocates documents with exposed sensitive content and provides options to protect them with remediation actions.

Data DiscoveryLocates documents with exposed sensitive content and provides options to protect them with remediation actions.

Data DiscoveryLocates documents with exposed sensitive content and provides options to protect them with remediation actions.